🔥 Explore this awesome post from WIRED 📖
📂 **Category**: Security,Security / Cyberattacks and Hacks,Security / Privacy,Security / Security News,Security Roundup
💡 **What You’ll Learn**:
As researchers and Practitioners discuss the impact of new AI models on cybersecurity Mozilla said Tuesday that it used early access to Anthropic’s Mythos Preview to find and fix 271 vulnerabilities in the new Firefox browser version 150. Meanwhile, researchers have identified a group of moderately successful North Korean hackers using AI for everything from crypto malware to creating fake corporate websites, stealing as much as $12 million in three months.
Researchers have finally cracked the disruptive malware known as Fast16, which preceded the Stuxnet virus and may have been used to target Iran’s nuclear program. It was created in 2005 and was likely published by the United States or one of its allies.
Meta is being sued by the Consumer Federation of America, a nonprofit, over fraudulent ads on Facebook and Instagram that allegedly mislead consumers about the company’s efforts to combat them. A US surveillance program that allows the FBI to view Americans’ communications without a warrant is up for renewal, but lawmakers are deadlocked over next steps. The new bill aims to address lawmakers’ growing concerns, but it lacks substance.
And if you’re looking for a deep dive, WIRED investigated the years-long controversy behind prominent privacy- and security-conscious mobile operating system GrapheneOS. Plus, we looked at the bizarre story of how China spied on American skater Alyssa Liu and her father.
And there’s more. Every week we round up security and privacy news that we haven’t covered in depth ourselves. Click on the titles to read the full stories. And stay safe out there.
Anthropic’s Mythos Preview AI model has been described as a tool with a serious ability to detect software and network vulnerabilities, and it’s so powerful that its creator has carefully restricted its release. But a group of amateur sleuths on Discord have found their own, relatively simple ways—that don’t require hacking AI—to gain unauthorized access to the coveted digital prize: the Mythos itself.
Despite Anthropic’s efforts to control who can use Mythos Preview, a group of Discord users gained access to the tool through some relatively straightforward detective work: They examined data from the recent hack of Mercor, an AI training startup that works with developers, and “made an educated guess about where the form was online based on knowledge about the format Anthropic had used for other forms” — a phrase that many observers speculated referred to a web URL — according to Bloomberg, which Uncover the story.
This person also reportedly took advantage of permissions they already had to access other Anthropy models, thanks to their work at the Anthropy contracting company. However, as a result of the investigation, they allegedly gained access to not only Mythos but also other unreleased Anthropic AI models. Fortunately, according to Bloomberg, the group that gained access to Mythos has so far only used it to build simple websites — a decision designed to prevent detection by Anthropic — rather than hacking the planet.
Security researchers have long warned that communications protocols known as Signaling System 7, or SS7, which govern how phone networks communicate with each other and route calls and text messages, are vulnerable to abuse that could allow covert surveillance. Researchers at the digital rights organization Citizen Lab revealed this week that at least two for-profit surveillance vendors have already used these vulnerabilities — or similar ones in next-generation communications protocols — to spy on real victims. Citizen Lab found that two surveillance companies essentially acted as rogue telecom companies, exploiting access to three small telecom companies — Israeli telecoms company 019Mobile, British cellular provider Tango Mobile, and Airtel Jersey, based on the English Channel island of Jersey — to track the location of targets’ phones. Citizen Lab researchers say “high-profile” people were tracked by the two surveillance companies, though they declined to name the companies or their targets. The researchers also warn that the two companies that discovered protocol abuse are likely not alone, and that the weakness of global communications protocols remains a very real vector for phone espionage around the world.
In a sign of an increasing — albeit belated — crackdown by U.S. law enforcement on the sprawling criminal industry of fraud complexes fueled by human trafficking across Southeast Asia, the Justice Department this week announced charges against two Chinese men for allegedly helping run a fraud complex in Myanmar and seeking to open a second complex in Cambodia. Jiang Wenjie and Huang Xingshan were both arrested in Thailand earlier this year on immigration charges, according to prosecutors, and now face charges of running a large-scale scam that lured human trafficking victims to their compound with fake job offers and then forced them to defraud victims, including Americans, of millions of dollars through fraudulent investments in cryptocurrency. The Justice Department says it also “restricted” $700 million of the operation’s funds — essentially freezing the money in preparation for seizure — and seized a channel on the messaging app Telegram that prosecutors say was used to lure and enslave human trafficking victims. The Justice Department statement alleges that Hwang personally participated in the corporal punishment of workers at one of the complexes, and that Jiang at one point oversaw the theft of $3 million from one American fraud victim.
The British government and non-profit UK Biobank revealed this week that three scientific research institutions are selling health information of British citizens on Alibaba. Over the past two decades, more than 500,000 people have shared their health data – including medical images, genetic information and healthcare records – with the UK Biobank, which allows scientists around the world to access the information to conduct medical research. However, the charity said the data leak involved a “breach of contract” signed by three organisations, as one of the datasets for sale is believed to have included data on all half a million research participants. It did not provide details on the full types of data being listed for sale, but said it had suspended the Biobank accounts of those allegedly selling the information. Data-specific ads have also been removed.
Earlier this month, 404 Media reported that the FBI was able to obtain copies of Signal messages from the defendant’s iPhone, with the content of the messages, which were encrypted within Signal, saved in the iOS push notification database. In this case, message transcripts can still be accessed despite removing Signal from the phone, although the issue affected all apps that send push notifications.
This week, in response to the issue, Apple released a security update for iOS and iPadOS to fix the flaw. “Notifications marked for deletion may be unexpectedly retained on the device,” Apple’s security update for iOS 26.4.2 says. “The logging issue was addressed through improved data redaction.”
Even though the issue is fixed, it’s still worth changing what appears in notifications on your device. For Signal, you can open the app, go to Settings, Notificationsand toggle notifications to show Name only or No name or content. This is another reminder that while apps like Signal are end-to-end encrypted, the same applies to content as it travels between devices: If someone can physically access your phone and unlock it, they can likely access everything on your device.
💬 **What’s your take?**
Share your thoughts in the comments below!
#️⃣ **#Discord #investigators #gained #unauthorized #access #Anthropic #Legends**
🕒 **Posted on**: 1777115607
🌟 **Want more?** Click here for more info! 🌟
