Skip to main content

Featured Post

AMD to invest $400 million in India by 2028: Here’s what we know

US chipmaker Advanced Micro Devices said on Friday it will invest around $400 million in India over the next five years and will build its largest design center in the tech hub of Bengaluru. AMD’s announcement was made by its Chief Technology Officer Mark Papermaster at an annual semiconductor conference that started Friday in Prime Minister Narendra Modi’s home state of Gujarat. Other speakers at the flagship event include Foxconn Chairman Young Liu and Micron CEO Sanjay Mehrotra. Despite being a late entrant, the Modi government has been courting investments into India’s nascent chip sector to establish its credentials as a chipmaking hub. AMD said it will open its new design centre campus in Bengaluru by end of this year and create 3,000 new engineering roles within five years. “Our India teams will continue to play a pivotal role in delivering the high-performance and adaptive solutions that support AMD customers worldwide,” Papermaster said. The new 500,000-square-foot (55,5...

Beware! Fake WhatsApp for iPhone users was used to hack targets

A fake version of WhatsApp for iPhone users was reportedly used to gather information of targeted users. The users were tricked into installing configuration files or Mobile Device Management (MDM) profiles to push potential malware.

According to a report by a cybersecurity research lab at the University of Toronto, Citizen Lab, which worked in collaboration with Motherboard, a specific domain—config5-dati[.]com—and an IP address that was related to the attacks were registered to a company called Cy4Gate in Italy.

However, a Cy4Gate spokesperson said in a statement to Motherboard that the config domains are not attributable to the company. However, the check3[.]it domain that was discovered by Motherboard did belong to Cy4Gate, the spokesperson said.

“We strongly oppose abuse from spyware companies, regardless of their clientele. Modifying WhatsApp to harm others violates our terms of service. We have and will continue to take action against such abuse, including in court,” a WhatsApp spokesperson told Motherboard.

The page for the fake iOS WhatsApp version, which is unavailable as of now, was made to look like an official WhatsApp site, complete with logos and branding matching that of the messaging app. It also enlisted steps to install the app. Users had to install a configuration file via the system settings menu on their iPhone, which raises questions as it is recommended to install apps directly from the App Store.

Fake WhatsApp phishing page. (Screenshot by Citizen Lab via Motherboard)

Security company ZecOps revealed in a tweet last week that Apple patched two vulnerabilities in iOS that may have been exploited, including that of a malicious app that may be able to elevate privileges.

“To help keep chats safe, we recommend that people download WhatsApp from the app store for their phone’s platform. In addition, we may temporarily ban people using modified WhatsApp clients we detect to help encourage people to download WhatsApp from an authoritative source,” the WhatsApp spokesperson added.

However, for users who did download the fake version of the messaging app, it was used to send information such as Unique Device Identifier (UDID), which is a unique ID assigned to each iOS device by Apple and International Mobile Equipment Identity (IMEI) back to attackers. Citizen Lab researcher Bill Marczak suggests that the attack was targeted and doesn’t look like the hackers were trying to spread it around. However, it remains who were being targeted with the spyware.

“Citizen Lab researchers said they could not gather data on the next stage of the attack, meaning it is unclear exactly what other data the hackers would have been able to exfiltrate from a target device,” Motherboard reported.



from BGR India https://ift.tt/2MSyx5s
via IFTTT

Comments