Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Cyber Weapon. Show all posts

Burner Phones Warn World Cup Fans of Qatar Apps

 



In a statement issued, the authoritative French data protection authority CNIL has provided tips on how football fans can implement security measures to avoid being spied on by apps. These tips can come in handy for the Qatar World Cup. 

To maximize your security, it would be best to travel with a blank smartphone or an old phone that has been reset by CNIL, a CNIL spokesperson told POLITICO earlier this week. If you are traveling to Qatar for the World Cup, it is highly recommended that you purchase an electronic burner phone.

In addition, you should avoid taking any photos that might violate the strict moral laws that govern the Gulf state. The spokesperson advised you should take special care with photographs, videos, or digital works that may present a problem. This is because of the laws that are in effect in the country you are visiting.

During the 2022 World Cup, which is scheduled to take place in Qatar between November 20 and December 18, around 1.5 million visitors are expected to be in the country. Sports events have been marred by controversy in recent years due to allegations of bribery and corruption. In addition, there are concerns about the treatment of LGBTQ+ people in the Gulf states, and concerns about media freedom throughout the country. 

To participate in the World Cup, foreign visitors are required to download two apps - the official World Cup application Hayya as well as the Covid tracking application Ehteraz, which is required to track gameplay. 

As a form of spyware, these apps have been deemed by experts to be a threat. This is because they will give Qatari authorities wide access to the data of their citizens. Among other things, they would also enable you to read, delete, add, or change content, as well as make direct calls to other users. 

“It is not my job to give travel advice, but I would never bring my mobile phone on a visit to Qatar,” said the Norwegian broadcaster’s head of security to Norway’s NRK broadcaster. The country’s data protection authority is also expected to advise traveling fans to install the apps on a burner phone.

France’s CNIL has other tips to limit spyware's impact on football fans who do not have a blank phone.

According to France's data protection authorities, users should download the app only just before departure and remove it once they have returned to France. The company is also encouraging its customers to limit the number of online services that require authentication to a minimum. They should also keep their smartphones by their side at all times, and have strong passwords for their accounts. 

A football fan should also limit the number of authorizations granted to the system to an absolute minimum.

It appears that Qatar has some form of privacy framework. This is indicated on a map of privacy laws around the world provided by the CNIL. However, it has not been recognized by the EU as providing specific privacy protections. A comparison has been made between this data protection rulebook and one that serves as the flagship of the bloc.

The Qatari apps have also raised concerns on the part of several European regulators.

As a spokesperson for the commissioner of German data protection and freedom of information told POLITICO, a spokesperson for the federal office for information security, as well as the Ministry for Foreign Affairs of Germany are all taking a closer look at the apps. 

In addition, delegations heading to an international climate summit in Egypt were reminded this week that the COP27 summit app is a potential cyber weapon. This is because it could be used to steal data.

Man Sentenced To 12 Years For Attempting To Purchase Chemical Weapon On The Dark Web

 

A 46-year-old Missouri man has been sentenced to 12 years without parole in US federal prison today for trying to obtain a chemical weapon via an illicit Dark Website with Bitcoin currency; the weapon has the capacity to kill hundreds of people. 

According to the court, the man named Jason Siesser had admitted his cybercrime and accepted that he attempted to purchase a chemical weapon two times between 14 June and August 4, 2018. Additionally, the court document has also mentioned that he had provided the order shipping address in the name of a juvenile, whose name, address he used illegally to acquire this highly toxic weapon including five batches of cadmium arsenide, hydrochloric acid, and other chemical compounds. 

As per the information that the court has provided, three batches of this chemical concoction would be enough to kill more than 300 people at once. On August 4, 2020, Siesser has been to prison for attempting to obtain a chemical weapon. 

Jason had ordered chemical weapons on two different occasions, at first, he ordered two 10 milliliter units of chemical on 4th July of 2018 with the use of cryptocurrencies. When the seller did not ship the order, he contacted him continuously. Then it was on 9th July of 2018, when he contacted the seller and asked him to ship the order as early as possible because he planned to use it immediately after receiving it. 

Jason ordered his second chemical on 5th august of 2018 and again he made the payment with help of Bitcoin, worth roughly $150. Notably, what he ordered, was a very toxic chemical. 

During the investigating officers' raid at Siesser's home, they had found nearly 10 grams of the toxic chemical including cadmium arsenide, which can be deadly if it ingested or inhaled; approximately 100 grams of cadmium metal and more than 500 mL of hydrochloric acid had been found. 

"Writings located within the home articulated Siesser’s heartache, anger and resentment over a breakup, and a desire for the person who caused the heartache to die," said the Department of Justice.

#BatchWiper, a new data-wiping virus targets Iranian computers


Recently, The Iranian CERT reported that a new piece of malware targets Iranian computers that capable of wiping the files from the infected computers.

SophosLabs have analyzed the new sample and confirmed that the malware attempt to erase the contents of any files on D, E, F, G, H and I drives.

The malware is distributed as a self-extracting WinRAR archive called GrooveMonitor.exe that drops three executable files: juboot.exe, jucheck.exe and SLEEP.EXE.

The 'justboot.exe' is a DOS BAT file that has been converted to PE format that uses 'SLEEP.exe' to wait for few seconds before it adds a registry entry that ensures that 'jucheck.exe' is executed each time the computer restarted.

The primary function of the malware is wiping the files from hard drive, but it does so only within few specific date ranges, each about two days long.

After deleting the data , the malware runs chkdsk in order to trick the victim into believing that the files have been corrupted because of software or hardware failure.