International Cyber Digest
3.4K subscribers
176 photos
11 videos
2 files
22 links
Your weekly go-to cybersecurity newsletter, curated and commented on by our senior analysts.
Download Telegram
❗️Security researchers used a low-cost consumer satellite dish to intercept satellite signals and found massive amounts of unencrypted traffic.

Revealing:
πŸ“‘ Military and government comms including GPS data
πŸ“‘ Credit card transactions
πŸ“‘ Phone calls and texts from remote cell towers
πŸ“‘ In-flight Wi-Fi activity

Presentation: https://www.youtube.com/watch?v=fM5w7bFNvWI

Don’t Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites:

https://satcom.sysnet.ucsd.edu/docs/dontlookup_ccs25_fullpaper.pdf

P.s. could anyone boost our channel so we level up? Thank you: https://t.iss.one/IntCyberDigest?boost
🀯3πŸ”₯2
‼️ Telegram allegedly has a CRITICAL zero-day vulnerability.

To exploit it, a threat actor has to send a corrupted sticker to their victim.

Telegram directly addressed the claim, stating the vulnerability does not exist.

We've asked the researcher for comment β€” stay tuned.
🀣34πŸ€”4❀2πŸ’©1😭1
‼️ S&P Global, responsible for the S&P 500, was compromised by TeamPCP during recent supply chain attacks (Trivy / LiteLLM).

We’ve known spglobal[.]com was on their list for some time now and didn’t get any reply from their press contact.
😱10🀣2❀1
πŸš¨β€ΌοΈ BREAKING: Databricks allegedly compromised in a TeamPCP supply chain attack.

Databricks is the leading cloud-based data analytics platform: used by organizations worldwide to manage massive datasets.

We notified them last week. They scaled up to investigate. We haven't heard back since.
❀7
πŸš¨β€ΌοΈ UPDATE: Here is a selection of companies compromised in the recent TeamPCP supply chain attacks.

This is just a fraction, the full list likely runs into the thousands. πŸ‘€

MTN: mtn[.]com
Gravatar: gravatar[.]com
Zoopla: zoopla[.]co[.]uk
Ansys: ansys[.]com
Ansys GitHub: github[.]com/ansys
ACUITY: acuity[.]com
StarTech: startech[.]com
Lightning: lightning[.]ai
Grid: grid[.]ai
Proton: proton[.]ai
Finkargo: finkargo[.]com
Hillspire: hillspire[.]com
Agronod: agronod[.]com
Spaceship: spaceship[.]com[.]ai
Hicap: hicap[.]ai
Pytorchbearer: github[.]com/pytorchbearer
KCI AI Team: github[.]com/kci-ai-team
🀯11πŸ”₯2πŸ‘1πŸ’©1
The threat actors who are part of TeamPCP are going crazy.

TeamPCP is imploding. Nearly every member has been kicked from the group and their operations are severely disrupted. πŸ‘€

They're having some rodent infestation problem. I wonder how, I wonder why...

Yesterday you told me 'bout the blue blue sky

And all that I can see is just a yellow lemon tree πŸ‹

https://www.youtube.com/watch?v=wCQfkEkePx8
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ₯΄12😁2❀1🀣1
Media is too big
VIEW IN TELEGRAM
❗️ A scammer was caught using an AI face mask to hide his true identity.

He works for a fake company called "Global Metrix", which offers recovery services for stolen crypto.
🀣19❀1😁1😭1
Me meeting up with my insiders for status updates on recent supply chain attacks.
🀣10😁8❀4πŸ”₯1
πŸš¨β€ΌοΈ MAJOR SUPPLY CHAIN ATTACK: npm package axios is compromised after the maintainer's npm account was hijacked.

Malicious versions contain a Remote Access Trojan. axios has 100M+ weekly downloads β€” it's in practically everything.

If you have installed [email protected] or [email protected], assume compromise.

Axios' lead maintainer jasonsaayman's npm account was compromised β€” email was swapped to an anonymous Proton Mail address.

Both malicious versions were pushed manually via npm CLI, bypassing GitHub Actions OIDC entirely, without commits.

πŸ”΄ Stepsecurity report: https://stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan

πŸ”΄ Socket report:
https://socket.dev/blog/axios-npm-package-compromised
❀8πŸ₯΄2
πŸš¨β€ΌοΈ BREAKING: Claude Code's source code has been leaked via a map file exposed in Anthropic's npm registry.

The leaked code appears to reveal new and previously undisclosed features.

Source code backups:

1)
https://github.com/chatgptprojects/claude-code

2)
https://pub-aea8527898604c1bbb12468b1581d95e.r2.dev/src.zip
πŸ‘11😱6❀5😁3
Claude Code uses axios btw πŸ₯΄
😭14😁4πŸ₯΄2