<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Leak Archives - Tricky Enough</title>
	<atom:link href="https://www.trickyenough.com/news-tag/data-leak/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.trickyenough.com/news-tag/data-leak/</link>
	<description>Explore and Share the Tech</description>
	<lastBuildDate>Fri, 09 May 2025 22:33:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.trickyenough.com/wp-content/uploads/2021/05/favicon-32x32-1.png</url>
	<title>Data Leak Archives - Tricky Enough</title>
	<link>https://www.trickyenough.com/news-tag/data-leak/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">100835972</site>	<item>
		<title>AT&#038;T Faces A Cyber Attack, Millions Of Data Leaked On Dark Web</title>
		<link>https://www.trickyenough.com/news/cyber-attack-at-att-millions-of-data-leaked-on-dark-web/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-attack-at-att-millions-of-data-leaked-on-dark-web</link>
					<comments>https://www.trickyenough.com/news/cyber-attack-at-att-millions-of-data-leaked-on-dark-web/#respond</comments>
		
		<dc:creator><![CDATA[Sunanda Sharma]]></dc:creator>
		<pubDate>Mon, 01 Apr 2024 15:10:41 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=117970</guid>

					<description><![CDATA[<p>AT&#38;T the US-based telecommunications company announced on Saturday that personal data of 73 million current and former accounts was leaked onto the dark web due to a cyberattack. The telecom company is currently investigating the cyber attack, which occurred about two weeks ago. Everything you need to know On Saturday, AT&#38;T was hit by a...</p>
<p>The post <a href="https://www.trickyenough.com/news/cyber-attack-at-att-millions-of-data-leaked-on-dark-web/">AT&amp;T Faces A Cyber Attack, Millions Of Data Leaked On Dark Web</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[




<p>AT&amp;T the US-based telecommunications company announced on Saturday that personal data of 73 million current and former accounts was leaked onto the dark web due to a cyberattack. The telecom company is currently investigating the cyber attack, which occurred about two weeks ago. </p>



<h2 class="wp-block-heading" id="h-everything-you-need-to-know">Everything you need to know </h2>



<p>On Saturday, AT&amp;T was hit by a cyber attack, resulting in 73 million accounts being leaked onto the dark web. The <a href="https://www.trickyenough.com/news/reddit-selling-data-to-google-for-ai-training-purposes/" target="_blank" rel="noreferrer noopener">company confirmed the data</a> to be from 2019 &amp; earlier. So far no evidence has been found as to what led to the cyber attack.</p>



<p>Although the company has reassured its account holders calling the situation unaffected. “As of today, this incident has not had a material impact on AT&amp;T’s operations,” the company wrote in a press release on Saturday.</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="AT&amp;T dark web data leak of over 70 million current, former customers" width="500" height="281" src="https://www.youtube.com/embed/CA6-A4UW6As?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p>The leaked information included data such as names, home addresses, phone numbers, date of birth, and Social Security Numbers. The company has advised users to set up fraud alerts and check their accounts and credit reports via email. </p>



<p>All the passcodes of the 7.6 million account holders have been reset. The event has caused a sudden panic in casual lives and reminded the importance of cybersecurity.</p>



<h2 class="wp-block-heading" id="h-how-can-we-prevent-a-cyber-attack-from-taking-place">How Can We Prevent A Cyber Attack from Taking Place</h2>



<p>In today&#8217;s world, <a href="https://www.trickyenough.com/how-to-create-a-strong-cybersecurity-culture-in-your-organization/" target="_blank" rel="noreferrer noopener">cybersecurity is more important than ever</a>. With ever-growing threats to businesses, having a strong security solution is essential. A simple hack into the system can lead to legal problems. There are far too many threats out there to ignore the risks.</p>



<p>Here are some ways to prevent cyber attacks :</p>



<ul class="wp-block-list">
<li>Keep your software and systems fully up-to-date</li>



<li>Ensure Endpoint Protection</li>



<li>Install a Firewall</li>



<li>Backup your data</li>



<li>Wifi Security</li>



<li>Passwords</li>
</ul>



<h2 class="wp-block-heading" id="h-conclusion">Conclusion</h2>



<p>With the recent event of cyber attack taking place at AT&amp;T, digital users and companies have become cautious. As for AT&amp;T, further investigation is still in progress. The company has managed to take care of the situation professionally and keep up with its reputation. </p>



<p><strong>Suggested Posts:</strong><br><a href="https://www.trickyenough.com/know-all-about-cybersecurity-and-its-importance-here/" target="_blank" rel="noreferrer noopener">Know All About CyberSecurity And Its Importance</a>.</p>



<p><a href="https://www.trickyenough.com/best-practices-for-mobile-app-security-and-data-privacy/" target="_blank" rel="noreferrer noopener">Best Practices for Mobile Security and Data Privacy</a>.</p>


<p>The post <a href="https://www.trickyenough.com/news/cyber-attack-at-att-millions-of-data-leaked-on-dark-web/">AT&amp;T Faces A Cyber Attack, Millions Of Data Leaked On Dark Web</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/cyber-attack-at-att-millions-of-data-leaked-on-dark-web/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">117970</post-id>	</item>
		<item>
		<title>Kaspersky Finds Cybersecurity Threat that Targets iPhone Users via iMessage to Gain Access</title>
		<link>https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access</link>
					<comments>https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/#respond</comments>
		
		<dc:creator><![CDATA[Vipin Gupta]]></dc:creator>
		<pubDate>Wed, 14 Jun 2023 15:05:36 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=86343</guid>

					<description><![CDATA[<p>If you&#8217;re an iPhone user, then you must be alert and careful before what you click on. There&#8217;s a new cyber threat found via Kaspersky Internet Security that targets iPhone devices and takes complete control of the device. One of the biggest cybersecurity and antivirus software companies &#8216;Kaspersky Internet Security&#8217; recently found a cybersecurity threat...</p>
<p>The post <a href="https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/">Kaspersky Finds Cybersecurity Threat that Targets iPhone Users via iMessage to Gain Access</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head><body><p>If you&#8217;re an iPhone user, then you must be alert and careful before what you click on. There&#8217;s a new cyber threat found via Kaspersky Internet Security that targets iPhone devices and takes complete control of the device.</p>



<p>One of the biggest cybersecurity and antivirus software companies &#8216;Kaspersky Internet Security&#8217; recently found a <a href="https://www.trickyenough.com/news/cyber-attack-at-att-millions-of-data-leaked-on-dark-web/" target="_blank" rel="noreferrer noopener">cybersecurity threat</a> called &#8216;Triangulation&#8217;. This threat targets old versions of iPhones, such as iOS 15.7, and gains complete access via the iMessage app.</p>



<h2 class="wp-block-heading" id="h-imessage-app-at-risk-kaspersky-internet-security">iMessage App at Risk kaspersky internet security</h2>



<p>The iMessage app contains a malicious attachment that automatically installs spyware &amp; takes complete control over the iPhone and its data.</p>



<p><a href="https://securelist.com/operation-triangulation/109842/" target="_blank" rel="noreferrer noopener nofollow">As per the Kaspersky report</a>, they just uncovered a cybersecurity threat. It is extremely complex &amp; targets iPhone devices via the iMessage app by auto-installing spyware and taking complete control of it.</p>



<h2 class="wp-block-heading" id="h-operation-triangulation">Operation Triangulation</h2>



<p>Also, Kaspersky CEO Eugene Kaspersky tweeted about this iOS attack, and it is called Triangulation. He said, &#8220;Our investigation of this Triangulation continues, and we expect further details to be shared soon.&#8221;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img fetchpriority="high" decoding="async" width="664" height="646" src="https://www.trickyenough.com/wp-content/uploads/2023/06/kaspersky-internet-security.jpeg" alt="" class="wp-image-86347" srcset="https://www.trickyenough.com/wp-content/uploads/2023/06/kaspersky-internet-security.jpeg 664w, https://www.trickyenough.com/wp-content/uploads/2023/06/kaspersky-internet-security-300x292.jpeg 300w, https://www.trickyenough.com/wp-content/uploads/2023/06/kaspersky-internet-security-150x146.jpeg 150w" sizes="(max-width: 664px) 100vw, 664px" /></figure></div>


<p>In the Kaspersky report, they said that their team of iPhone users <a href="https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/" target="_blank" rel="noreferrer noopener">recognized this malware attack</a>. This threat is quietly entered via the iMessage app and gets access to microphones, cameras, photos, messages, geolocation, and other sensitive data. </p>



<p>He also said that this threat had been neutralized and complete <a href="https://www.trickyenough.com/news/wordpress-tracks-down-xss-vulnerability-users-to-update-to-6-5-2/" target="_blank" rel="noreferrer noopener">vulnerability details</a> had been sent to the Apple company.</p>



<p>Further investigation shows that dozens of iPhone devices were infected with this attack.</p>



<h2 class="wp-block-heading" id="h-the-zero-click-attack-kaspersky-internet-security">The Zero-Click Attack kaspersky internet security</h2>



<p>Getting this threat inside the iPhone device is easier; the user will receive a message on the iMessage app with an attachment. When the user <a href="https://www.trickyenough.com/news/bumble-compliments-feature-has-rolled-out-that-allow-users-to-message-before-match/" target="_blank" rel="noreferrer noopener">opens the message</a>, a threat will automatically go inside the device and take complete control over the device. Once the hacker gets complete control, the message with the attachment will automatically be selected from the device.</p>



<p>On Friday, Kaspersky also released tools to identify if the device is infected. </p>



<p>One of the clear indications or ideas to check this Triangulation attack on iPhone devices was that it turned off the iOS update and didn&#8217;t allow users to update their iOS version. </p>



<p>The CEO of Kaspersky noticed that turning off the iMessage app can prevent iOS devices from being attacked. <a href="https://www.trickyenough.com/news/ios-16-adoption-rate-reaches-81-ahead-of-ios-17-announcement/" target="_blank" rel="noreferrer noopener">iOS 16 seems safe </a>from this Triangulation threat, and there are low chances but not guaranteed.</p>



<h2 class="wp-block-heading" id="h-apple-ios-16-3-updates">Apple iOS 16.3 Updates</h2>



<p>Furthermore, Apple released major updates that fixed vulnerabilities with iOS 16.3 and MacOS 13.2 supported iPhone, iPad, and Mac devices.</p>



<p>Suggested:</p>



<p><a href="https://www.trickyenough.com/security-good-antivirus/" target="_blank" rel="noreferrer noopener">What Security features must have in Good Antivirus</a>?</p>



<p><a href="https://www.trickyenough.com/remove-malware-from-computer/" target="_blank" rel="noreferrer noopener">How To Remove Malware From Computer</a>?</p>
</body></html>
<p>The post <a href="https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/">Kaspersky Finds Cybersecurity Threat that Targets iPhone Users via iMessage to Gain Access</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">86343</post-id>	</item>
		<item>
		<title>&#8220;Goldoson,&#8221; an Android Malware, Invade 60 Applications on Google Play</title>
		<link>https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=goldoson-an-android-malware-invade-60-applications-on-google-play</link>
					<comments>https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/#respond</comments>
		
		<dc:creator><![CDATA[Namita Mahajan]]></dc:creator>
		<pubDate>Fri, 19 May 2023 08:52:45 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=84237</guid>

					<description><![CDATA[<p>Goldoson is an Android malware that invades 60 applications. These applications had 100M downloads collectively. This malware is a third-party library component that all 60 applications were using. However, the developers were not known about the malware. Here is the list of a few infected applications: McFee&#8217;s research team discovered this malware, &#8220;Goldoson.&#8221; According to...</p>
<p>The post <a href="https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/">&#8220;Goldoson,&#8221; an Android Malware, Invade 60 Applications on Google Play</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Goldoson is an Android malware that invades 60 applications. These applications had 100M downloads collectively. This malware is a third-party library component that all 60 applications were using. However, the developers were not known about the malware.</p>



<p><strong>Here is the list of a few infected applications:</strong></p>



<ul class="wp-block-list">
<li>L.POINT with L.PAY &#8211; 10 million downloads</li>



<li>Pikicast &#8211; 5 million downloads</li>



<li>Swipe Brick Breaker &#8211; 10 million downloads</li>



<li>Money Manager Expense &amp; Budget &#8211; 10 million downloads</li>



<li>LIVE Score, Real-Time Score &#8211; 5 million downloads</li>



<li>GOM Player &#8211; 5 million downloads</li>



<li>Compass 9: Smart Compass &#8211; 1 million downloads</li>



<li>and more</li>
</ul>



<p>McFee&#8217;s research team discovered this malware, &#8220;Goldoson.&#8221; <a href="https://www.mcafee.com/blogs/other-blogs/mcafee-labs/goldoson-privacy-invasive-and-clicker-android-adware-found-in-popular-apps-in-south-korea/" target="_blank" rel="noreferrer noopener">According to them</a>, the malware collected data from different resources, including the user&#8217;s GPS location, WiFi-connected devices, Bluetooth devices, and installed apps.</p>



<p>Moreover, it could do ad fraud if a user clicks on any ad without taking consent from the user.</p>



<h2 class="wp-block-heading" id="h-android-malware-steals-data-from-devices">Android Malware <strong>Steals Data from Devices</strong></h2>



<p>If a user downloads and installs any application containing Goldoson, its library automatically logs the device and captures its configuration using a remote private server.</p>



<p>The configuration includes all the parameters Android malware can run on the device for ad clicking and data stealing.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img decoding="async" width="595" height="795" src="https://d1w4k2ccg1tr4m.cloudfront.net/wp-content/uploads/2023/05/config.webp" alt="Android Malware" class="wp-image-84239" srcset="https://www.trickyenough.com/wp-content/uploads/2023/05/config.webp 595w, https://www.trickyenough.com/wp-content/uploads/2023/05/config-225x300.webp 225w, https://www.trickyenough.com/wp-content/uploads/2023/05/config-150x200.webp 150w" sizes="(max-width: 595px) 100vw, 595px" /></figure></div>


<p>Every two days, it collects data by activating the function of data collection. Then, it sends the C2 server the list of geographical locations, installed apps, and MAC addresses of the devices connected via WiFi, Bluetooth, etc.</p>



<p>The data amount collected by the malware depended on the permissions provided by the user. For example, Devices with <a href="https://www.trickyenough.com/exploring-android-11-and-android-12-android-studio-4-0-features/" target="_blank" rel="noreferrer noopener">Android 11</a> or above provide high-level protection for data. So, they might be less affected compared to the lower versions.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img decoding="async" width="609" height="334" src="https://d1w4k2ccg1tr4m.cloudfront.net/wp-content/uploads/2023/05/json-data.jpg" alt="" class="wp-image-84240" srcset="https://www.trickyenough.com/wp-content/uploads/2023/05/json-data.jpg 609w, https://www.trickyenough.com/wp-content/uploads/2023/05/json-data-300x165.jpg 300w, https://www.trickyenough.com/wp-content/uploads/2023/05/json-data-150x82.jpg 150w" sizes="(max-width: 609px) 100vw, 609px" /></figure></div>


<p>However, McAfee also found that in recent OS versions, users gave malware enough permission to collect sensitive data of their devices in 10% of apps. Along with that, The function of ad-clicking is activated using a customized HTML code, various URL visits, WebView, and generating ad revenues.</p>



<p>Goldoson libraries are removed from the Google Play app. But, MaAfee warned the users to always check twice before allowing permissions to any application because the risk is still there.</p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/remove-malware-from-computer/" target="_blank" rel="noreferrer noopener">How To Remove Malware From Computer</a>.</p>
<p>The post <a href="https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/">&#8220;Goldoson,&#8221; an Android Malware, Invade 60 Applications on Google Play</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">84237</post-id>	</item>
	</channel>
</rss>
