Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Spams. Show all posts

Google Introduces RETVec: Gmail’s New Defense to Identify Spams


Google has recently introduced a new multilingual text vectorizer called RETVec (an acronym for Resilient and Efficient Text Vectorizer), to aid identification of potentially malicious content like spam and fraudulent emails in Gmail. 

While massive platforms like YouTube and Gmail use text classification models to identify frauds, offensive remarks, and phishing attempts, threat actors are known to create counter-strategies to get around these security mechanisms. 

The project description on GitHub reads, "RETVec is trained to be resilient against character-level manipulations including insertion, deletion, typos, homoglyphs, LEET substitution, and more."

"The RETVec model is trained on top of a novel character encoder which can encode all UTF-8 characters and words efficiently."

The Google-sponsored platforms reveal that they have been using Adversarial text manipulations, such as the usage of homoglyphs, keyword stuffing, and invisible characters. 

With its out-of-the-box support for over 100 languages, RETVec seeks to contribute to developing more robust and computationally affordable server-side and on-device text classifiers that are more durable and effective. 

In natural language processing (NLP), vectorization is a technique that maps words or phrases from a lexicon to a matching numerical representation for use in sentiment analysis, text classification, and named entity recognition, among other analyses. 

Google’s anti-abuse researchers Elie Bursztein and Marina Zhang note in the Google Security blog that, “due to its novel architecture, RETVec works out-of-the-box on every language and all UTF-8 characters without the need for text preprocessing, making it the ideal candidate for on-device, web, and large-scale text classification deployments." 

Google further notes that incorporating vectorizer into Gmail has really helped in detecting spam, with the detection rate escalating over the baseline by 38%. Also, the false positive rate has declined by 19.4%. 

Moreover, vectorization has also reduced the model's Tensor Processing Unit (TPU) usage by 83%. 

"Models trained with RETVec exhibit faster inference speed due to its compact representation. Having smaller models reduces computational costs and decreases latency, which is critical for large-scale applications and on-device models," Bursztein and Zhang added. 

Spams are the most popular attack vector in the virtual space, used by almost every cybercriminal. The popularity comes with its convenience of being omnipresent, cheap, and efficient, enabling cybercriminals to transfer malware and access sensitive data from targeted systems.  

Xtreme: Flipper Zero can Spam Android, Windows Devices with Bluetooth Alerts


Xtreame, a custom Flipper Zero Zeo firmware has recently introduced a new feature to conduct Bluetooth spam assaults on Windows and Android devices. 

The technique was first demonstrated by a security researcher against Apple iOS devices, which encouraged others to test its possible effects on other systems.

The underlying idea behind the spam is to send fake advertising packets to devices within range of pairing and connection requests by using Flipper Zero's wireless communication capabilities.

These kinds of spam attacks are challenging for the victims since they cannot be differentiated whether the device is legitimate or fake. Also, spam attacks impact the user experience by constantly displaying notifications and pop-ups on the targeted device. 

Xtreme Adds ‘Bluetooth Spam’

Earlier this month, Flipper Xtreme revealed on its Discord channel that “spam attacks” will be included in the upcoming major firmware release. 

The Xtreme team also released a demonstration video showing a denial of service (DoS) attack on a Samsung Galaxy mobile, in which the device becomes unusable due to an incessant stream of connection alerts.

While this latest firmware version is not far from reaching a stable status, the “spam attack” has been included in the most recent development build through a new program called 'BLE Spam,' which can be found on GitHub.

A YouTuber called ‘Talking Sasquach,’ after running a trial of the dev firmware image on his Flipper Zero, revealed that the attack functions as anticipated on both Windows and Android.

Currently, the BLE Spam app gives users eight flood attack options, which include: 

  • Every method combined 
  • iOS 17 Lockup Crash 
  • Apple Action Modal 
  • Apple Device popup 
  • Android device pair 
  • Windows Device Found
Any of these options can lead Flipper Zero to start broadcasting the corresponding Bluetooth packets, causing nearby devices to display connectivity prompts and notifications.

How to Block These Spam Attacks

These spam attacks create more nuisance to the users, rather than a real threat. Since BLE Spam enables users to create personalized notifications, these spams can become more crafty and cunning, contributing to social engineering and other threat scenarios.

These Flipper Zero attacks may cause issues because Android 14 and Windows 11 devices by default display notifications on Bluetooth connection requests. Fortunately, blocking these messages on both systems is easy.

However, users must not worry about these rogue broadcasts, since they cannot directly damage recipients' devices or execute code on them. It is further suggested that users must learn how to stop the notifications in the event of ongoing pranking to avoid wasting time or aggravating themselves.  

Doosra is Helping to Create an Alternative Digital Identity

 


Facebook, WhatsApp, Twitter, and other online media platforms have been approached to verify the identity of their users — this could be either through telephone numbers or government-provided IDs like the Aadhaar card. Putting your number online isn't only a danger even with expanding government observation. It is additionally about security and online safety since personal data can have in-real-life (IRL) outcomes like being targeted by stalkers, trolls, or individuals looking to hack into your account. “Where there is personal data, there is a great risk of hackers trying to steal it,” pointed out Mozilla in a statement. 

An Indian start-up situated in Hyderabad called Doosra has a potential solution. It will provide you with a 10-digit virtual telephone number (without another SIM card) that can be shared with shopping places, stores, and more arbitrary places. Along these lines, all the spam calls and messages with offers will be coordinated to the virtual number and your own number will stay liberated from spams. You will be able to stay hidden when you choose to call back an unknown incoming number without revealing your phone number.

“The only people that will have any kind of access to your primary number would be if we got an executive order from the official authorities,” Aditya Vuchi, founder and chief executive of Doosra said. This implies that if your social media handle is discovered to be a part of any activity, which abuses Section 69 of the IT Act, the government or Supreme Court will first have to issue an order to the social media platform. If and once they find that the mobile number given is a Doosra number, they should issue another order to Doosra to access your primary number. 

The six-month-old Doosra is the first such service to be accessible in India. It isn't that other such applications don't exist — like 2ndLine, Hushed, and Burner — however, you need an American or Canadian number to sign up for them. Doosra caters to numbers based out of India. You need your real number to sign up for the service, and it isn't free with plans beginning at ₹59 each month for essential services and ₹83 for the pro package.

Hackers take advantage of Coronavirus panic, launch Cyberattacks


The whole world is in high alert with coronavirus COVID-19, as being declared a pandemic and every government is making a tremendous effort to get the virus under control and protect its citizens. The virus already has everyone in a panic with the loss of life, tumbling economy and the global shutdown but one group is seemingly using this chaos and panic to its advantage. As the virus makes headlines daily, people heed to every information they can get to beat COVID-19, and hackers are using this to their gain. Several cybersecurity firms have reported cases and attacks in various forms by hackers using COVID-19 to lure their victims into spreading malware and falling into other traps. People are staying indoors and working from home and increasingly using the internet which presents as a sweet cake for hackers.


Here is how hackers are exploiting the global panic from the virus

Phishing Mails and Malwares
FireEye a cybersecurity company, has learned about cybersecurity threats coming from China, North Korea, and Russia. Chinese hacking group attacks East Asia, the North Korean groups are targeting South Korean Non-governmental Organizations and Russian groups are attacking parts of Ukraine. These use phishing emails and spams to spread malware but they are not just limited to malware, some mails are business mails to fish out money from the receiver.

Stealing Personal Information
A Chinese group named Vicious Panda by the security firms has tricked people into sharing sensitive personal information using a document from Mongolian Health Ministry. Other hackers are using maps and dashboards for stealing personal information reports Reason Labs. The most common one is the abuse of the dashboard created by John Hopkins University. People rely on these to track the spread of the virus and know the infected number.

Fake Apps, Websites Imposters, and Misinformation 
Among other methods are - Fake Apps to track the spread of coronavirus and the infected patient, where they went, where not to go, virus hotspots. These apps are filled with malware and could be asking you to pay money. Then there are the Fake websites, where the actors imposter global organizations like the World Health Organization. Some social media campaigns and accounts are also responsible for sharing misinformation about the virus that it's a conspiracy of rival countries.

The crux is, as long as COVID-19 remains a threat, hackers will continue to take its advantage, so we need to be diligent and smart while surfing the net to avoid being scammed. A few steps like only trusting variable sources for information on the virus life

  • Use a trustable source of information on the virus. 
  • Not installing apps from unverified sources. 
  • Don't pay anything to any website or application, only trust government sources. 
  • Don't open spam emails or any attachment if it's not known.