This question comes from Reddit, where someone answered correctly.
We have a collection of many other "Is This a Bug?" photos and explanations.Wednesday, October 18, 2023
World Spy News Roundup
CA - The Five Eyes countries' intelligence chiefs came together on Tuesday to accuse China of intellectual property theft and using artificial intelligence for hacking and spying against the nations, in a rare joint statement by the allies. more
USA - Ethical hacker helps prevent a potential espionage disaster for CIA. A glitch on X, formerly known as Twitter, could have opened a can of worms for the Central Intelligence Agency (CIA) had an ethical hacker on the microblogging website not sprung to action. more
Survey - 53% of employees in the Middle East, Turkiye, and Africa region fear spying from drones... Corporate spies and hackers use drones to get trade secrets, confidential information, and other sensitive data from corporations and data centers. A drone can carry a device for hacking into corporate networks – for instance, a smartphone, a compact computer (e.g., Raspberry Pi), or a signal interceptor (e.g., Wi-Fi Pineapple [1]), and hackers use these devices to access corporate data and disrupt communications. All wireless communication (Wi-Fi, Bluetooth, RFID, etc.) is vulnerable to drone attacks. more
Finland - Dead man's estate and firm fined €5m in shipyard espionage case. A man who worked for the Meyer Turku shipyard copied files from the shipyard and a shipping company onto a hard drive and transferred them to his own consulting firm – but then died while the investigation was underway. more
Yet Another USB Cautionary Tale
Mr Burgess (ASIO Director General Mike Burgess) referenced an unnamed Australian company that found global success making a product "similar to a motion detector" before their sales suddenly dropped.
"A little while later, their product started being returned to the factory because they were broken," he said.
"When they opened their branded products, they discovered they weren't their branded products, because the components were inferior, they were exact knock-offs."
The problem was eventually traced to an international conference, where someone had offered to share information with one of the company's employees by plugging a USB into their laptop.
"That USB downloaded malware onto that laptop, which later on, when they were connected back to their corporate network, was used to steal their intellectual property," he said.
"That intellectual property was passed from the intelligence services to state-owned enterprise that mass-produced the goods and sold them on the market that undercut them." more
• USB – Hacked Charging Cables
• USB – Malicious Spy Cable Detector Instructions
• USB – General Memory Stick Warning
• USB – NSA Type Cable Bug – $6.74
Extra USB Spy News - Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber espionage campaign dubbed TetrisPhantom. "The attacker covertly spied on and harvested sensitive data from APAC government entities by exploiting a particular type of secure USB drive, protected by hardware encryption to ensure the secure storage and transfer of data between computer systems," Kaspersky said in its APT trends report for Q3 2023. more
Monday, October 16, 2023
The CARVER Mindset: How to Think Like a Spy - FREE
Luke Bencie (Mr. Carver Mindset), is a really smart guy. His book, Among Enemies: Counter-Espionage for the Business Traveler which first introduced me to him is excellent. Check out his other books, too. His Monday morning emails are always inspiring. I look forward to receiving them. Great way to start the week. The sign-up is at the bottom of this page.
CARVERCON 2023 is coming November 1st (Day of the Dead).
Friday, October 13, 2023
Smartphone Security: Delete These Apps
Some of the most popular apps you love and have come to rely on could be posing more of a danger than they're worth. Here's what you need to know. ...some of those apps that you love and have come to rely on could actually be putting you at risk... We’ve (Reader's Digest) collected information about some of the worst offenders so that you can make an educated decision about which apps you trust with your privacy and which ones need to go...
CamScanner
Ana Bera is a cybersecurity expert with Safe at Last. She identified CamScanner, an app meant to imitate a scanner with your phone, as one of the apps consumers should be concerned about. “Cybersecurity experts have found a malicious component installed in the app that acts as a Trojan Downloader and keeps collecting infected files,” she explains. “This kind of app can seriously damage your phone and should be de-installed instantly. Luckily, once you remove it from your phone, it is highly unlikely that it will continue harming you.”
Weather apps
“Check your weather app,” says Shayne Sherman, CEO of TechLoris. “There have been several different weather apps out there that have been laced with Trojans or other malwares.” While the most benign of these claims to take your information purely for weather accuracy, he calls that questionable. “Watch your local forecast instead, and if you have Good Weather, delete it now,” he advises. “That one is especially dangerous.”
Look, we all love our social networking apps. But cybersecurity expert Raffi Jafari, cofounder and creative director of Caveni Digital Solutions, says, “If you are looking for apps to delete to protect your information, the absolute worst culprit is Facebook. The sheer scale of their data collection is staggering, and it is often more intrusive than companies like Google. If you had to pick one app to remove to protect your data, it would be Facebook.”
“This is a call to action for users who may be living under a rock and unaware of the vulnerabilities that were disclosed earlier this year,” says Michael Covington, VP of Product for mobile security leader Wandera. “The vulnerabilities with WhatsApp—both iOS and Android versions—allowed attackers to target users by simply sending a specially crafted message to their phone number. Once successfully exploited, the attackers would be granted access to the same things WhatsApp had access to, including the microphone, the camera, the contact list, and more.”
Whatsapp and Instagram are both owned by Facebook, which is part of what makes them all a risk. Dave Salisbury, director of the University of Dayton Center for Cybersecurity and Data Intelligence, says that Instagram “requests several permissions that include but are not limited to modifying and reading contacts and the contents of your storage, locating your phone, reading your call log, modifying system settings, and having full network access.” Plus Nine More
Stores Silently Deploying Facial Recognition to Spy on Shoppers
Cameras are being used not just to catch persistent shoplifters, but also to monitor shoppers and analyze their emotions, so that stores can deliver personalized adverts on screens inside the store, George warned...
‘But it’s also being used for marketing purposes, they are gathering information on shoppers and seeing what they are buying and not buying - and using AI tools to analyse the emotions of shoppers and see what sort of ads to direct at them.’ more
Intense Competition Leads to Attempted Corporate Espionage
First, prior to the Zoom meeting, Arthur AI employees recognized that OneOneThree had no website. The Timesarticle says that Fung told Arthur AI at the time that OneOneThree was in “stealth mode,” which is why it had no website. Then, when Arthur AI asked Fung to sign a nondisclosure agreement (NDA), he reportedly asked Arthur AI to “hold off on the NDA,” and Arthur AI agreed.
Despite these issues, a Zoom meeting was arranged to demo the technology. Fung said Karina Patel, OneOneThree’s “main engineer,” would dial in to the meeting. However, during the Zoom meeting, an attendee logged in under the name of Aparna Dhinakaran, which an Arthur AI employee immediately recognized as a founder of Arize AI, a rival startup. When recognized, the attendee quickly logged off. Arthur AI later deduced that Fung was, in fact, an employee of Arize AI named Dat Ngo, and OneOneThree was an inactive company of his.
After the call concluded, one of Arthur AI’s employees messaged Ngo via LinkedIn direct messaging. Ngo responded by trying to recruit the Arthur AI employee, according to the Times article. more
Lessons Learned:
- Require NDAs Every Time.
- Perform Proper Due Diligence and Act Consistently With Your Findings.
- Only Use Secure Communication Channels and Restrict Recording.
- Train Employees on Spotting and Responding to Potential Threats.
- Conduct a Prompt and Careful Investigation Into Suspected Activity.
Apple AirTag: Police Official Accused of Stalking
The female officer who accused Labrada of stalking contacted Ontario police after she discovered an AirTag — a small tracking device that can be attached to personal items — among her possessions, according to two sources familiar with the case.
A group of officers from a since-disbanded San Fernando Valley gang unit is under investigation for, among other misconduct, allegedly using the devices to track suspects without court authorization...
Ontario police had been investigating the stalking allegations, but the San Bernardino County district attorney’s office said Wednesday it did not have enough evidence to pursue charges against Labrada. more
Monday, October 9, 2023
China Is Becoming a No-Go Zone for Executives
“There is a very significant cautionary attitude toward travel to China,” said Tammy Krings, chief executive of ATG Travel Worldwide, which works with large employers around the world. “I would advise mission-critical travel only.” Krings said she has seen a roughly 25% increase in cancellations or delays of business trips to China by U.S. companies in recent weeks. more
Where The Spies Are
Details: European states have been actively countering the Russian intelligence network, expelling employees of Russian embassies since the beginning of Russia's full-scale invasion of Ukraine in February 2022.
Fine... Feathered Drones Now
Earlier this year we revealed creepily realistic drones made from dead birds were being developed by scientists. more
How New Corporate Espionage Techniques Are Born, or... Their Next App Attack
Wednesday, October 4, 2023
If Ants Can be Tricked, What Chance do Corporations Have?
In a study in the journal Science, researchers report that blue butterfly caterpillars infiltrate red ant colonies and grub food by mimicking the raspy sound of the ant queen.
It’s good to be the Queen. You get fed and cared for and generally treated like royalty. But if you’re a blue butterfly caterpillar, you can get the same benefits by just pretending to be queen. Because these crafty caterpillars trick ants into feeding them—by mimicking the sound of their queen.
Ants are social creatures whose colonies contain a queen ant, and hordes of worker ants who feed the queen and take care of all her young. Blue butterfly caterpillars have come up with clever ways to exploit that system. These parasitic caterpillars take up residence in the nests of red ants. And they mooch free meals in part by waggling their heads to beg for food like all the other ant grubs.
- Your company is filled with hard-working, innocent, social creatures.
- Anyone bent on corporate espionage knows they just have to blend in.
- They will listen to your sounds.
- They will exploit your system.
- They will imitate loyalty.
- They will eat your lunch.
- Fight back.
Monday, October 2, 2023
FutureWatch - Robot Eavesdropping Microphone Smart Swarms
Each of the circular, wheeled robots is about an inch across. After deployment from a charging station, they all travel in different directions, emitting high frequency sounds to communicate with one another and make sure they are spread out as far as possible from one another. These high-pitched chirps also keep the robots from falling off of tables or bumping into other obstacles.
Monday, September 25, 2023
Legacy Systems Threaten Security in Mergers & Acquisitions
We have seen two primary trends throughout 2023:
– Threat groups are closely following news cycles, enabling them to quickly target entire portfolios with zero-day attacks designed to upend aging technologies — disrupting businesses and their supply chains.
– Corporate espionage cases are also on the rise as threat actors embrace longer dwell times and employ greater calculation in methods of monetizing attacks. more