As discussions continue about the implications of new AI developments on cybersecurity, Mozilla reported it leveraged early access to Anthropic’s Mythos Preview to identify and rectify 271 vulnerabilities within its newly released Firefox 150 browser. Concurrently, researchers uncovered a group of North Korean hackers utilizing AI tools to perpetrate theft—all in a bid to pilfer millions, estimated at $12 million within just three months.
Furthermore, a significant revelation came when experts managed to analyze a malware variant named Fast16, which predates the infamous Stuxnet and is believed to have targeted Iran’s nuclear initiatives. Created in 2005, the malware is suspected of being deployed by the U.S. or its allies.
In recent legal developments, Meta is facing a lawsuit from the Consumer Federation of America concerning scam advertisements on its platforms, specifically Facebook and Instagram. On the surveillance front, a contentious U.S. program allowing the FBI to access American communications without warrants is under scrutiny, with lawmakers stuck in a stalemate over potential reforms.
A deeper exploration of privacy and security issues was published by WIRED, highlighting the prolonged conflict within the team responsible for developing GrapheneOS—a prominent mobile operating system focused on safeguarding personal information. Additionally, an unusual story surfaced involving Chinese spying on American figure skater Alysa Liu and her father.
Here are some further highlights from the week:
Unauthorized Access to Anthropic’s Mythos
A group of Discord users found their own rudimentary methods to access Anthropic’s Mythos Preview AI model. Their entry point stemmed from insights gained through a breach at Mercor, an AI training startup. By making educated guesses about the model’s online configuration based on Anthropic’s previous releases and leveraging existing permissions from their contracting roles, they accessed not just Mythos but other unreleased models. Fortunately, their activities have thus far been limited to crafting simple websites, avoiding more malicious uses.
Telecom Vulnerabilities Exploited for Surveillance
Research by Citizen Lab highlighted how for-profit surveillance companies are taking advantage of telecom protocol vulnerabilities. By exploiting weaknesses in the SS7 protocol, these firms acted as rogue carriers to track individuals’ locations, primarily targeting high-profile victims without naming the firms or their targets.
Crackdown on Scam Operations
The U.S. Department of Justice announced criminal charges against two individuals involved in managing scam operations in Southeast Asia. These operations, based primarily in Myanmar and Cambodia, reportedly exploited human trafficking victims, coercing them into scam activities that defrauded individuals—especially Americans—of millions in cryptocurrency investments.
UK Health Data for Sale
A scandal erupted as the UK government and UK Biobank disclosed that over 500,000 health records belonging to British citizens were listed for sale on Alibaba. This breach involved multiple scientific institutions violating data-sharing agreements, prompting immediate account suspensions and data removal from the platform.
Apple Fixes Notification Bug
In response to reports that the FBI accessed deleted Signal messages from iPhones via a flaw in the push notification system, Apple rolled out a security update. This patch aims to ensure that notification data marked for deletion doesn’t remain accessible on devices, emphasizing the importance of user privacy even in encrypted messaging applications.
These unfolding stories underline ongoing challenges in cybersecurity and the intersections of technology with privacy, law, and security. Stay informed and vigilant.