Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    InfoSec News Nuggets 04/08/2026

    April 8, 2026

    Yearly Breach Reports Summary 2023

    April 8, 2026

    Top Cybersecurity Certifications in Canada: Essential Credentials, Costs & Career ROI

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»InfoSec News Nuggets 03/23/2026 – AboutDFIR
    News

    InfoSec News Nuggets 03/23/2026 – AboutDFIR

    adminBy adminMarch 23, 2026No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

    CISA and FBI Director Kash Patel jointly warned Friday that Russian intelligence-linked threat actors are conducting an active, widescale phishing campaign targeting users of encrypted commercial messaging apps — primarily Signal and WhatsApp — that has already resulted in unauthorized access to thousands of individual accounts belonging to current and former U.S. government officials, military personnel, political figures, and journalists. The attacks do not exploit any vulnerability in Signal or WhatsApp themselves; instead, attackers use a combination of tactics including malicious QR codes that abuse the apps’ legitimate “linked devices” feature to silently mirror a victim’s conversations to an attacker-controlled device, device code phishing via fake app invitations, and spoofed support messages impersonating the apps’ own security teams to harvest PINs and 2FA codes. CISA and the FBI urged high-value individuals to enable phishing-resistant FIDO authentication, activate Lockdown Mode on iPhones, move away from SMS-based MFA, and periodically audit their linked devices list in both Signal and WhatsApp to check for unauthorized pairings.

     

    US Seizes Domains and Infrastructure Used in Sprawling Botnet Campaigns

    The U.S. Justice Department, in coordination with law enforcement in Germany and Canada, announced the seizure of command-and-control infrastructure, virtual servers, and domains underpinning four major IoT botnets — Aisuru, KimWolf, JackSkid, and Mossad — which together had compromised over three million devices globally, including cameras, routers, and streaming devices, and collectively issued more than 316,000 DDoS attack commands against victims worldwide including against IP addresses owned by the Department of Defense Information Network. The Aisuru botnet is responsible for the largest publicly documented DDoS attacks in history — including a 31.4 Tbps peak in December 2025 — while KimWolf drew particular notice from researchers for its novel technique of infiltrating residential proxy networks to compromise devices sitting behind home routers, a method that evades the IP-blocking approaches that typically stop internet-facing attacks. The Justice Department did not announce arrests in connection with the takedown, instead describing the action as an infrastructure disruption designed to prevent further infections and eliminate or limit the botnets’ ability to launch future attacks — consistent with the FBI’s increasingly common strategy of using civil seizure authority to disrupt criminal infrastructure even when criminal prosecution is not yet ripe.

     

    Navia Benefit Solutions Discloses Data Breach Impacting 2.7 Million People

    Navia Benefit Solutions — a benefits administration company serving more than 10,000 employers across the U.S. that manages Flexible Spending Accounts, Health Savings Accounts, Health Reimbursement Arrangements, commuter benefits, and retirement services — has notified nearly 2.7 million individuals that their personal data was stolen after hackers maintained unauthorized access to company systems from December 22, 2025 through January 15, 2026, with the breach discovered on January 23. Exposed data includes names, Social Security numbers, dates of birth, financial account information, health insurance details, and other sensitive personal records — though Navia says claims data and financial payment information were not affected — and affected individuals are being offered 12 months of identity monitoring through Kroll. No ransomware group has claimed the attack, and the breach adds to a growing pattern of benefits administration and HR software vendors being targeted as high-value single points of compromise, where one successful intrusion exposes the full employee populations of thousands of downstream client organizations. (Note: BleepingComputer blocks automated fetches but is fully accessible in-browser.)

     

    US Soldier Sentenced for Helping North Korean IT Workers

    A U.S. Army soldier has been sentenced after pleading guilty to charges stemming from his role in helping North Korean nationals fraudulently obtain remote IT employment at American companies — the first active-duty military member to face criminal prosecution in connection with North Korea’s sprawling IT worker scheme, which the U.S. government estimates has generated hundreds of millions of dollars for Pyongyang’s weapons programs. The case follows a steady stream of prosecutions over the past 18 months targeting U.S.-based enablers of the scheme — including laptop farm operators in Arizona, Tennessee, Florida, and Maryland — but the military angle is significant: it raises concerns that North Korean operatives may be deliberately cultivating relationships with U.S. service members as facilitators, exploiting financial pressures or other vulnerabilities to recruit insiders with elevated system access and security clearances. The Justice Department has increasingly framed the IT worker scheme not merely as fraud but as a national security threat, noting that North Korean workers have in multiple documented cases attempted to exfiltrate sensitive data, conduct extortion against employer companies, and gain access to government contractor systems after being placed in roles requiring clearances.

     

    Operation Alice Takes Down 370,000+ Dark Web Sites

    A Europol-backed, German-led law enforcement operation called Operation Alice has dismantled over 373,000 dark web sites that were advertising child sexual abuse material (CSAM) and cybercrime-as-a-service tools, using a creative honeypot strategy that began by targeting a fraudulent dark web marketplace called “Alice with Violence CP” — a Chinese-national-run scam platform that defrauded would-be CSAM buyers — and turning the investigation into a nearly five-year intelligence-gathering operation that unmasked the identities of 440 customers who attempted to purchase illegal material. The operation ran from March 9-19, 2026, and Europol said investigations are actively continuing into more than 100 of the 440 identified individuals, with authorities acting immediately in any case where a child was assessed to be in danger — including a 2023 case in which Bavarian police raided the home of a 31-year-old father who attempted to purchase CSAM and subsequently convicted him. The simultaneous takedown of hundreds of thousands of dark web sites representing the infrastructure underlying both the CSAM and cybercrime-as-a-service marketplaces reflects a maturing law enforcement strategy of using criminal honeypots to map and then disrupt entire illicit ecosystems rather than targeting individual vendors one at a time.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleFormat string vulnerability in fazsvcd
    Next Article Urgent & Alert (Great for Breaking News or High Stakes)
    admin
    • Website

    Related Posts

    News

    InfoSec News Nuggets 04/08/2026

    April 8, 2026
    News

    Microsoft rolls out fix for broken Windows Start Menu search

    April 8, 2026
    News

    How Secure by Design Helps Developers Build Secure Software

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    InfoSec News Nuggets 04/08/2026

    April 8, 2026

    Yearly Breach Reports Summary 2023

    April 8, 2026

    Top Cybersecurity Certifications in Canada: Essential Credentials, Costs & Career ROI

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.