As the 2024 presidential election in the United States approaches, WIRED highlighted documents that provide insights into U.S. government evaluations concerning various aspects of election security and stability. These reports, initially obtained by the national security transparency group Property of the People, included an assessment from the US Department of Homeland Security issued in October, which indicated that financially motivated cybercriminals and ideologically driven hacktivists pose a greater risk to U.S. election infrastructure than state-sponsored hackers. Additionally, another memo cautioned about the danger of insider threats to the election, noting that such internal misconduct could undermine a fair and transparent electoral process.
In a climate marked by intense polarization and confrontation, U.S. elections have become increasingly fortified, featuring bulletproof glass, drones, defensive barriers, and armed security personnel safeguarding election offices, with election officials preparing for potential violent incidents. A WIRED investigation also uncovered a successful CIA operation that infiltrated Venezuela’s military payroll system, which was part of a covert initiative by the Trump administration aimed at toppling Nicolás Maduro’s autocratic regime.
In other cybersecurity developments, WIRED examined the ongoing struggle of firewall vendor Sophos against Chinese hackers conducting espionage on vulnerable devices over five years, striving to eliminate their presence. Furthermore, researchers have issued a warning regarding a serious zero-click vulnerability identified in a default photo application on Synology network-attached storage devices, which could be exploited by cybercriminals to extract data or breach networks.
As always, there’s an abundance of news. Each week, we compile important security and privacy updates that we haven’t explored in detail. Click on the headlines to access the complete stories. And remember to stay safe.
A Disney worker, who was terminated from the company yet retained access to its passwords, is accused of infiltrating the software utilized by the dining establishments at Walt Disney World, according to reports from 404 Media and Court Watch. A criminal allegation against Michael Scheuer asserts that he unlawfully accessed the third-party menu-creation software designed for Disney and modified menus, for instance, altering fonts to Windings—the font composed entirely of symbols.
According to the criminal complaint, “The fonts were renamed by the perpetrator to keep the original font’s name, but the actual characters appeared as symbols.” It continues, “Due to this modification, all menus within the database became unusable because the font alterations cascaded throughout the database.”
However, the accusations extend beyond mere font mischief. The federal complaint also outlines how Scheuer purportedly modified menu items to inaccurately indicate that dishes containing peanuts were safe for allergy sufferers, attempted to access Disney employees’ accounts, and locked 14 employees out of their accounts by employing an automated login script. Furthermore, he reportedly accumulated a folder of personal data about employees and even showed up at one individual’s residence. A lawyer for Scheuer has not publicly commented on these claims.
In recent years, infostealers have gained traction among hackers, ranging from cybercriminals seeking financial gain to advanced nation-state actors. This type of malware, often embedded in pirated software, leverages web browsers to capture usernames and passwords, cookies, financial details, and other information users input on their computers. Recently, law enforcement worldwide dismantled the Redline infostealer, which has been correlated with the theft of over 170 million data points and linked to large-scale cyber breaches. Another nearly identical infostealer named Meta was also neutralized. As part of Operation Magnus, US authorities pinpointed Russian national Maxim Rudometov as the architect behind Redline. As TechCrunch reports, Rudometov’s identity emerged after multiple operational security missteps, which included the reuse of online handles and email addresses across various social networks and websites. The US Department of Justice’s criminal complaint highlighted Rudometov’s dating profile, indicating he had “liked” 89 other users but received no likes in return.
In January 2018, it became apparent that GPS data from the running and cycling application Strava could potentially reveal sensitive military sites along with the movements of individuals exercising nearby. Authorities cautioned that this posed a significant security threat. Years later, it appears that many have overlooked these warnings. A series of reports by French newspaper Le Monde has disclosed that agents from the US Secret Service are sharing their data via the fitness app, which has facilitated the tracking of Joe Biden, Donald Trump, and Kamala Harris. Security personnel associated with French President Emmanuel Macron and Russian President Vladimir Putin are similarly revealing their movements. The individuals disclosing their data often utilized public profiles and frequently shared activities that commenced or concluded at their accommodations during official visits. Among the information released were details about bodyguards linked to Putin who were seen jogging near a palace that the Russian leader has denied owning.
In Italy, prosecutors have placed four individuals under house arrest and have unveiled an investigation into at least 60 more after an intelligence company allegedly infiltrated government databases, amassing data on over 800,000 individuals. The firm, Equalize, reportedly accumulated sensitive details about various prominent figures in Italy, including well-known politicians, business leaders, and athletes, according to Politico. The compromised data is said to have included bank records, police files, and other personal information. Allegations suggest that this stolen information was sold or utilized for blackmail purposes, with the perpetrators raking in €3.1 million. This scandal has incited outrage among Italian lawmakers and may extend beyond Italy’s borders, as fresh reports indicate that Equalize counted Israeli intelligence and the Vatican as potential clients.