{"id":11648,"date":"2022-03-24T10:47:54","date_gmt":"2022-03-24T10:47:54","guid":{"rendered":"http:\/\/egrowonline.com\/?p=11648"},"modified":"2022-03-24T10:47:54","modified_gmt":"2022-03-24T10:47:54","slug":"microsoft-says-digital-extortion-gang-lapsus-targets-cryptocurrency-too","status":"publish","type":"post","link":"http:\/\/egrowonline.com\/?p=11648","title":{"rendered":"Microsoft says digital extortion gang Lapsus$ targets cryptocurrency, too"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"article-body\">\n<p class=\"inq-p\">A digital extortion gang with a murky background and unconventional methods \u2014 one researcher called them \u201claughably bad\u201d at times \u2014 has claimed responsibility for a string of compromises against some of the world\u2019s largest technology companies.<\/p>\n<p class=\"inq-p\">The group, known as Lapsus$, said in a series of public posts on the messaging app Telegram this week that it had accessed Okta Inc., the San Francisco-based identity-management firm that provides authentication tools for an array of business clients. Okta said Tuesday that attackers may have viewed data from about 2.5% of its customers after breaching the laptop of an engineer at a third-party vendor.<\/p>\n<p class=\"inq-p\">Lapsus$ previously claimed to breach organizations including Nvidia Corp., Samsung Electronics Co., and the gaming company Ubisoft Entertainment. The group said it also accessed data from Microsoft Corp., saying it had gathered source code from the company\u2019s Bing search engine, Bing Maps, and the Cortana digital assistant. Microsoft said attackers gained \u201climited access\u201d to its systems, and that attackers had compromised a single account to gather data.<\/p>\n<p class=\"inq-p\">In recent years, most hacking groups have used malware to encrypt a victim&#8217;s files, then demanded payment to unlock them, so-called ransomware. Sometimes the groups steal sensitive data and threaten to make it public unless they are paid.<\/p>\n<p class=\"inq-p\">Lapsus$ functions as a &#8220;large-scale social engineering and extortion campaign,&#8221; though it does not deploy ransomware, Microsoft said. The group uses phone-based tactics to target personal email accounts at victim organizations and pays individual employees or business partners of an organization for illicit access, according to Microsoft.<\/p>\n<p class=\"inq-p\">Lapsus$ also is known for hijacking individual accounts at cryptocurrency exchanges to drain user holdings.<\/p>\n<p class=\"inq-p\">In a March 10 post on its Telegram channel, the group urged followers to provide access to a virtual private network inside their employers\u2019 systems, or share details on how to access remote work tools. In addition, they sought access to telecommunication companies, software and gaming corporations, and Latin American phone service providers.<\/p>\n<p class=\"inq-p\">Joshua Shilko, a senior principal analyst at the cybersecurity firm Mandiant Inc., said Lapsus$ may have been active as early as mid-2021 when group members were posting in underground forums. &#8220;They&#8217;re into the notoriety. They&#8217;re interested in being in the spotlight,&#8221; he said, adding that the evidence shows they are financially motivated.<\/p>\n<p class=\"inq-p\">In a Twitter post responding to the Lapsus$ allegation, Okta chief executive officer Todd McKinnon said the matter dated back to a January security incident.<\/p>\n<p class=\"inq-p\">Okta chief security officer David Bradbury on Tuesday revealed a five-day window in January when an attacker gained access to a laptop for a support engineer who worked for a third-party vendor. Bradbury also said the company had detected an unsuccessful hacking attempt in January. Okta shares fell 10.4% Wednesday, closing at $148.55 on Nasdaq.<\/p>\n<p class=\"inq-p\">The group\u2019s Telegram channel posted a series of screenshots that it claimed were evidence of the hack and said that Okta wasn\u2019t the ultimate target. \u201cBEFORE PEOPLE START ASKING: WE DID NOT ACCESS\/STEAL ANY DATABASES FROM OKTA \u2014 our focus was ONLY on okta customers. ????.\u201d<\/p>\n<p class=\"inq-p\">Brett Callow, a threat analyst at the cybersecurity firm Emsisoft, called the group&#8217;s tactics &#8220;quite bizarre.&#8221; Their actions, he said, &#8220;suggest that they may be kids who&#8217;re in it for the lulz as much as they are the bucks.&#8221; (&#8220;Lulz&#8221; is a variation of LOL, for laugh out loud).<\/p>\n<p class=\"inq-p\">Initial activity from the group suggested that at least some of its members were in Brazil, as that was the home nation of many of the companies first targeted, said Allan Liska, intelligence analyst at the threat-intelligence firm Recorded Future. Membership in hacking collectives is fluid, Liska said. Recorded Future hasn&#8217;t observed any activity from apparent Lapsus$ members on popular Russian-speaking forums, he said.<\/p>\n<p class=\"inq-p\">\u201cThey seem laughably bad at times, but then here they are publishing Microsoft source code,\u201d he said. \u201cThis may be that same mix of really talented members and some idiots. Even idiots stumble into success once in a while.\u201d<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.inquirer.com\/business\/hackers-tech-okta-microsoft-lapsus-20220324.html\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A digital extortion gang with a murky background and unconventional methods \u2014 one researcher called them \u201claughably bad\u201d at times \u2014 has claimed responsibility for a string of compromises against some of the world\u2019s largest technology companies. The group, known as Lapsus$, said in a series of public posts on the messaging app Telegram this [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11649,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[36],"tags":[52,271,6548,6205,6549,331,1142],"class_list":["post-11648","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency","tag-cryptocurrency","tag-digital","tag-extortion","tag-gang","tag-lapsus","tag-microsoft","tag-targets"],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"http:\/\/egrowonline.com\/wp-content\/uploads\/2022\/03\/TZKUF4JMGBFFXA7AEUQIGE5HZU.jpg","_links":{"self":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/11648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11648"}],"version-history":[{"count":1,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/11648\/revisions"}],"predecessor-version":[{"id":11650,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/11648\/revisions\/11650"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/media\/11649"}],"wp:attachment":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11648"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}