The worst malware, security, and privacy breaches of 2023

2023 was quite a rollercoaster ride when it came to cybersecurity. Cybercriminals continue on a rampage, taking advantage of weaknesses in all sorts of devices, platforms, and networks. From sneaky phishing tricks to dreaded malware infections and data breaches, it felt like we were under constant siege. It’s safe to say that the security and privacy of millions of people were compromised. Here are some of the worst malware, security, and privacy breaches of this past year.

 

1) Russian cyber group Star Blizzard unleashes a global spear-phishing attack

A Russian hacking group tied to the Kremlin unleashed a global attack. They use what appear to be links to innocent websites to steal information. These hackers from Star Blizzard, which formerly operated as SEABORGIUM, are also known as Callisto Group/TA446/COLDRIVER/TAG-53/BlueCharlie.

The dangerous group targets anyone who might have information they can use. They even went after the U.S. government. For the most part, Star Blizzard has attacked people tied to academics, defense, government organizations, and more in the U.S. and the U.K. According to the U.S. Cybersecurity and Infrastructure Security Agency, the group is also targeting NATO members and countries near China.

Read more 

 

2) Guard your passwords: CherryBlos & FakeTrade malware threaten Androids

Credit: Trend Micro

Two related malware campaigns target Android users interested in cryptocurrencies or online income opportunities. The first campaign uses phishing websites to trick users into downloading apps that contain the CherryBlos malware. This malware can steal your cryptocurrency wallet credentials and replace your withdrawal address with the attacker’s.

The second campaign uses fake money-earning apps that contain the FakeTrade malware. These apps promise you increased income, but they will not let you withdraw your funds. Both campaigns use fake posts on popular platforms like TikTok, Twitter, and Telegram to lure you into their traps.

Read more 

 

3) Massive cyberattack strikes millions of Americans: Are you at risk?

Millions of Americans faced a significant threat to their personal data as a result of a massive cyberattack targeting the widely used file-transfer program known as MOVEit. The impact was vast, even compromising residents of Louisiana and Oregon who possessed driver’s licenses or state identification cards, and there were concerns among officials that the number of affected individuals could increase sizably. Moreover, this breach had far-reaching consequences, impacting numerous firms and organizations, including multinational corporations, federal and state agencies, and universities.

Read more 

 

MORE: TOP IDENTITY THEFT SCAMS TO AVOID\

 

4) Facebook accounts hit with malicious ad attack with dangerous malware

Credit: Bitdefender Labs

In an alarming revelation, Bitdefender Labs had uncovered a sinister turn in cybercrime tactics on Facebook. Hackers used a virus called NodeStealer to steal cookies and passwords. It’s a sneaky piece of code that runs on JavaScript and Node.js, and it can grab your web browser data and use it to hack into your Facebook account.

How do they do it? Well, they use cunning malvertising campaigns, which are fake ads that look like they’re from Meta, the company that owns Facebook. When you click on these ads, you’re actually downloading the NodeStealer virus, which then starts to spy on your online activity.

Read more 

 

MORE: DON’T FALL FOR THAT “LOOK WHO DIED” FACEBOOK MESSAGE TRAP 

 

5) Beware of this new Mac malware targeting your data and devices

In the grand scheme of cyber threats, a new villain emerged from the shadows, targeting none other than our beloved Mac users. With a penchant for pilfering passwords, greed for grabbing crypto, and a propensity for pocketing personal data, this digital bandit goes by the name “Realst.” Masked behind the guise of counterfeit blockchain games, it poses an ominous threat to your virtual safety.

“Realst” isn’t just your run-of-the-mill malware – oh no – it’s a crafty chameleon in the world of cybercrime, vetting its victims through seemingly innocent game access codes shared over social media or direct messages. “Realst” doesn’t just have one form but 16 distinct variants that it uses to carry out its malicious activities.

Read more 

 

6) The new iPhone security threat that allows hackers to spy on your phone

Credit: Apple

A troubling new vulnerability in iOS now allows hackers to spy on you through your keyboard. Certo Software released a report revealing how cybercriminals are avoiding Apple’s stringent security measures to steal your information.

Essentially, what hackers are doing is installing a third-party keyboard that features a keylogger into your iPhone. They’ll disguise that keylogger in a small app and use Apple’s TestFlight tool for app developers to bypass Apple’s security checks. Hackers are hoping you download those apps and turn over your own information.

Read more 

 

7) Mac users beware of new malware targeting your confidential information

If you thought your Mac was invincible, it’s time to reconsider. A sneaky malware is on the prowl, ready to snatch your personal information and dash away with your credit card details. The malware goes by the name of ShadowVault, and it isn’t just your garden-variety cyber-thief. It insidiously goes about its business on compromised Mac devices, siphoning off valuable info such as usernames and passwords, stored credit card info, data from crypto wallets, and more. The worst part? Criminals can subscribe for 500 dollars a month to access and use this malware. Cyber security firm Guardz discovered the ShadowVault malware through the XSS forum on the dark web, where it was being offered to anyone who was willing to pay the $500 bucks per month to rent the malware.

Read more 

 

8) Massive free VPN data breach exposes 360M records

Credit: Apple App Store (Qingdao Leyou Hudong Network Technology Co)

Cybersecurity researcher Jeremiah Fowler discovered and reported that over 360 million user data records have been leaked in a breach with the free VPN service SuperVPN. These records contained tons of personal information, including email addresses, original IP addresses, geolocation records, unique user identifiers, references to visited websites, and more.

Fowler did an enormous amount of research and found one key detail that was quite concerning. He noticed that the smartphone app for SuperVPN was listed under different developers depending on the App Store it was downloaded from.

The Google Play Store version was credited to SuperSoft Tech, while the Apple App Store version was credited to Qingdao Leyou Hudong Network Technology Co. Both companies seem to have connections to China as the notes for each are written in Mandarin, which serves as the official language of the country. Fowler then discovered a publicly exposed database linked with the SuperVPN app containing 133 GB of data.

Read more 

 

9) Beware of fake browser updates on your Mac

Credit: Malwarebytes

If you use a Mac, you may have seen pop-ups or notifications urging you to update your web browser. But before you click on them, you should know that they could be part of a malicious malware campaign called ClearFake, which is designed to steal your personal data.

ClearFake is the name given to a malware campaign that uses fake browser updates to infect your Mac with a credential stealer called Atomic Stealer. This campaign was first discovered by security company Malwarebytes in their threat research report. According to Malwarebytes, ClearFake is one of the first social engineering campaigns that targets both Windows and Mac users with fake browser updates.

Read more 

10) Despite an FBI takedown, the infamous Raccoon Stealer malware returns

In the world of digital wrongdoing, it seems some cyber pests never really go extinct. Remember Raccoon Stealer? If you don’t, it is a malware strain, and you might want to brace yourself. It’s back, it’s bolder, and it’s up to no good—again.

Picture this: A malware so astute it pilfers data from 60 applications. We’re talking login details, credit card numbers, those treasured browser histories you thought were safe, and even the ever-popular cryptocurrency accounts.

Now, what if I told you that this notorious service was available to any aspiring hacker for a mere $200 subscription a month? It’s the Netflix of cybercrime, except you get stolen credentials instead of shows. 

Read more

 

So, how do you guard your digital domain?

Have strong passwords: Using the same password across multiple platforms will always make you more vulnerable because if one account gets hacked, they all get hacked.  Use a password manager to keep track of all your passwords. Instead of relying on a single password, which, if stolen, can expose you. 

Use 2-factor authentication: -Implementing 2-factor authentication is just an extra shield that will prevent a hacker from getting into your accounts.

Have good antivirus software on all your devices: The best way to protect yourself from malware like this is to install antivirus protection on all your devices. Having antivirus software on your devices will make sure you are stopped from clicking on any potential malicious links that may install malware on your devices, allowing hackers to gain access to your personal information.

Special Back to School offer for CyberGuy Readers:  My #1 pick is TotalAV, and you can get a limited-time deal for CyberGuy readers: $19 your first year (80% off) for the TotalAV Antivirus Pro package.

Find my review of Best Antivirus Protection here

Best Antivirus Protection 2023

 

When in doubt: Picture this: a dimly lit alleyway with a sign that reads “Free Gold Here!” Sounds suspicious? That’s the online equivalent of dubious websites offering tantalizing downloads. Even if they lure you in with promises from seemingly legitimate sources (like Google Ads or seemingly authentic YouTube videos), always be skeptical. Check the website’s credentials, look for secure connection indicators (like the padlock symbol), and if in doubt, steer clear.

Use identity theft protection: Identity Theft protection companies can monitor personal information like your Home title, Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

One of the best parts of using Identity Guard includes identity theft insurance of up to 1 million dollars to cover losses and legal fees and a white glove fraud resolution team where a US-based case manager helps you recover any losses.

Special for CyberGuy Readers:  Save up to 51% with my top recommendation is Identity Guard.

Read more of my review of best identity theft protection services here.

Best identity theft protection services 2023

Create alias email addresses: Sometimes, it’s best to create various email aliases so that you don’t have to worry about all your info getting taken in a data breach.  An email alias address is a great way to stop receiving constant spam mail by simply deleting the email alias address.

In addition to creating throwaway email accounts for online sign-ups and other circumstances where you would not want to disclose your primary email address, alias email addresses are helpful for handling and organizing incoming communications. Sometimes, it’s best to create various email aliases so that you don’t have to worry about getting tons of spam mail and having your email eventually stolen in a data breach.

My #1 pick for secure and private email is StartMail, which allows users to create unlimited, customized aliases.  You can get an Exclusive holiday deal for CyberGuy readers: 60% off: $23.98 for first year ($2 per month, billed annually).  Includes a free 7-day trial.

Some of StartMail’s best perks include:

  • StartMail email address
  • 10 GB of email
  • Unlimited aliases
  • Access email on any device
  • Import your contacts easily
  • No ads, no tracking
  • Send encrypted emails to anyone

See my review of best secure and private email services here

Control spam – How to create a quick alias email address

 

When the damage is done: Immediate recovery steps

If you’ve clicked a malicious link and you think your device has been infected with malware, follow these tips below.

Scan your device: Think of it as a digital health check-up. Use a trusted antivirus, as I mentioned above, to run a comprehensive scan to detect and remove any lingering traces of malware. Don’t just stop there—schedule regular checks to ensure your device stays in top health.

Alert financial institutions: Just as you’d report a missing credit card, if you believe your info might’ve fallen into the wrong hands, it’s crucial to inform your banks and credit card companies. They can monitor suspicious activities or temporarily freeze your accounts to prevent unauthorized access.

Stay updated: It might be tempting to hit “remind me tomorrow” on those software updates, but those patches often address known vulnerabilities. Cybercriminals are always on the hunt for out-of-date software. By staying updated, you’re essentially closing the doors they’re looking to sneak in through.

 

Kurt’s key takeaways

This past year was a wake-up call for all of us when it comes to cybersecurity and privacy. We witnessed some of the most sophisticated and devastating cyberattacks in history, targeting individuals, businesses, and governments alike. The attackers used various methods and tools to exploit vulnerabilities and steal sensitive data, money, and identities. As we enter 2024, we must be more vigilant and proactive in protecting ourselves and our devices from these cyber threats. We also need to demand more accountability and transparency from the companies and platforms that handle our data and information. Cybersecurity is not a luxury, but a necessity in this day and age.

Which of the malware, security, and privacy breaches mentioned above surprised you the most and why? Let us know in the comments below.

FOR MORE OF MY SECURITY ALERTS, SUBSCRIBE TO MY FREE CYBERGUY REPORT NEWSLETTER HERE

 

Answers to the most asked CyberGuy questions:

 

 

 

Copyright 2023 CyberGuy.com.  All rights reserved.  CyberGuy.com articles and content may contain affiliate links that earn a commission when purchases are made.

Related posts

Understanding brushing scams and how to protect yourself

From TikTok to trouble: How your online data can be weaponized against you

Food tracking just got lazy (In the best way possible) with this wearable