Digital Sovereignty & Cyber Security
6.8K views | +0 today
Follow
Digital Sovereignty & Cyber Security
From cyberwar to digital encryption, security issues to state sovereignty
Your new post is loading...
Your new post is loading...
Scooped by Philippe J DEWOST
Scoop.it!

Telegram Bot sells 533 million Facebook Users' Phone Numbers for $20 a piece

Telegram Bot sells 533 million Facebook Users' Phone Numbers for $20 a piece | Digital Sovereignty & Cyber Security | Scoop.it

A user of a low-level cybercriminal forum is selling access to a database of phone numbers belonging to Facebook users, and conveniently letting customers look up those numbers by using an automated Telegram bot.

Although the data is several years old, it still presents a cybersecurity and privacy risk to those whose phone numbers may be exposed—one person advertising the service says it contains data on 500 million users. Facebook told Motherboard the data relates to a vulnerability the company fixed in August 2019.

"It is very worrying to see a database of that size being sold in cybercrime communities, it harms our privacy severely and will certainly be used for smishing and other fraudulent activities by bad actors," Alon Gal, co-founder and CTO of cybersecurity firm Hudson Rock, and who first alerted Motherboard about the bot, said.

Upon launch, the Telegram bot says "The bot helps to find out the cellular phone numbers of Facebook users," according to Motherboard's tests. The bot lets users enter either a phone number to receive the corresponding user's Facebook ID, or visa versa. The initial results from the bot are redacted, but users can buy credits to reveal the full phone number. One credit is $20, with prices stretching up to $5,000 for 10,000 credits. The bot claims to contain information on Facebook users from the U.S., Canada, the U.K., Australia, and 15 other countries.

 

Philippe J DEWOST's insight:

The ultimate phone book business model

Philippe J DEWOST's curator insight, January 27, 2021 3:39 AM

A new phonebook business model ?

Rescooped by Philippe J DEWOST from pixels and pictures
Scoop.it!

Peter Thiel Employee Helped Cambridge Analytica Before It Harvested Data - The New York Times

Peter Thiel Employee Helped Cambridge Analytica Before It Harvested Data - The New York Times | Digital Sovereignty & Cyber Security | Scoop.it

As a start-up called Cambridge Analytica sought to harvest the Facebook data of tens of millions of Americans in summer 2014, the company received help from at least one employee at Palantir Technologies, a top Silicon Valley contractor to American spy agencies and the Pentagon.

 

It was a Palantir employee in London, working closely with the data scientists building Cambridge’s psychological profiling technology, who suggested the scientists create their own app — a mobile-phone-based personality quiz — to gain access to Facebook users’ friend networks, according to documents obtained by The New York Times.

 

Cambridge ultimately took a similar approach. By early summer, the company found a university researcher to harvest data using a personality questionnaire and Facebook app. The researcher scraped private data from over 50 million Facebook users — and Cambridge Analytica went into business selling so-called psychometric profiles of American voters, setting itself on a collision course with regulators and lawmakers in the United States and Britain.

 

 

[Read more about the Cambridge Analytica whistle-blower contending that data-mining swung the Brexit referendum.]

The revelations pulled Palantir — co-founded by the wealthy libertarian Peter Thiel — into the furor surrounding Cambridge, which improperly obtained Facebook data to build analytical tools it deployed on behalf of Donald J. Trump and other Republican candidates in 2016. Mr. Thiel, a supporter of President Trump, serves on the board at Facebook.

Philippe J DEWOST's insight:

It is really starting to suck. Big Time. Palantir state customers should start to think again IMHO.

Philippe J DEWOST's curator insight, March 28, 2018 12:54 PM

It is really starting to suck. Big Time. Palantir state customers should start to think again IMHO.

Scooped by Philippe J DEWOST
Scoop.it!

Clues in Marriott hack implicate China | Reuters

Clues in Marriott hack implicate China | Reuters | Digital Sovereignty & Cyber Security | Scoop.it

Hackers behind a massive breach at hotel group Marriott International Inc (MAR.O) left clues suggesting they were working for a Chinese government intelligence gathering operation, according to sources familiar with the matter.

 

Marriott said last week that a hack that began four years ago had exposed the records of up to 500 million customers in its Starwood hotels reservation system.

 

Private investigators looking into the breach have found hacking tools, techniques and procedures previously used in attacks attributed to Chinese hackers, said three sources who were not authorized to discuss the company’s private probe into the attack.

That suggests that Chinese hackers may have been behind a campaign designed to collect information for use in Beijing’s espionage efforts and not for financial gain, two of the sources said.

 

While China has emerged as the lead suspect in the case, the sources cautioned it was possible somebody else was behind the hack because other parties had access to the same hacking tools, some of which have previously been posted online.

Identifying the culprit is further complicated by the fact that investigators suspect multiple hacking groups may have simultaneously been inside Starwood’s computer networks since 2014, said one of the sources.

Philippe J DEWOST's insight:

Still makes a low customer per citizen ratio...

No comment yet.