AboutDFIR.com – The Definitive Compendium Project
Digital Forensics & Incident Response

Blog Post

InfoSec News Nuggets 08/02/2022

What does Tim Hortons think your data is worth? A coffee and donut, apparently

Tim Hortons, the Canadian fast food chain accused of using its mobile app to collect “vast amounts of sensitive location data” in violation of Canadian privacy laws, says it’s reached a proposed settlement in the resulting class action lawsuits, Vice reports. To make up for tracking users, recording their movements “every few minutes” even when the app was closed, the chain is proposing to give affected users… a free hot beverage and a free baked good worth a little under $9 CAD plus tax. Customers started receiving emails detailing the proposed settlement on Friday, and screenshots were posted to Twitter by James McLeod. “You are receiving this email in connection with a proposed settlement, subject to Court approval, of a national class action lawsuit involving the Tim Hortons app and the collection of geolocation data between April 1, 2019, and September 30, 2020,” the email reads. “As part of the proposed settlement agreement, eligible app users will receive a free hot beverage and a free baked good.”


These ransomware hackers gave up when they hit multi-factor authentication

A ransomware attack was prevented just because the intended victim was using multi-factor authentication (MFA) and the attackers decided it wasn’t worth the effort to attempt to bypass it. It’s often said that using MFA, also known as two-factor authentication (2FA), is one of the best things you can do to help protect your accounts and computer networks from cyberattacks because it creates an effective barrier – and now Europol has seen this in action while investigating ransomware gangs.  


Miscreants aim to cause Discord discord with malicious npm packages

Cybercriminals continue to use npm packages to drop malicious packages on unsuspecting victims, most recently to steal Discord login tokens, bank card data, and other user information from infected systems. Details of the latest npm campaign, dubbed “LofyLife” by Kaspersky threat intelligence hunters, comes at the same time that GitHub – which owns NPM the compny, and in turn is owned by Microsoft – unveiled an array of enhancements to npm security in the wake several high-profile incidents involving malicious npm packages.And it’s needed “Any attack vector that can reach a significant number of targets – or a number of significant targets – is of interest to threat actors,” Casey Bisson, head of product and developer enablement at code security vendor BluBracket, told The Register, adding that npm has tens of millions of users and tens of billions of hosted package downloads.


Cyber insurance may be cyberficial, but…

Insurance might be one of the least liked, but most valued purchases within a business when you need to use it.  In previous decades, it was needed against fire, theft, and other tangible threats to a business, yet as cyber-attacks are becoming an inevitable, frequent occurrence, the demand for cyber insurance is at an all-time high. However, qualifying for cyber insurance coverage is easier said than done. Businesses not only have to manage the soaring cost of premiums, but also meet a long list of complex criteria that deems their current security strategy and implementation eligible for financial protection. 


These 13 Android apps have infected millions — delete them immediately

Another Android malware threat has spread to millions of users who downloaded one or more of these 13 infected apps discovered by McAfee roaming freely in Google’s Play Store. We recently reported that the malicious Joker malware had infected thousands of users who downloaded apps from Google’s Play Store. The threat of malware even through Google’s Play Store is a long-standing issue that Google has to address soon or lose consumer confidence.  In just the past two weeks, we have reported on over 50 applications available in the Google Play Store that can infect your devices with malware, and this past June, we reported on an additional 28 adware trojans “built into a selection of otherwise inconspicuous apps, ranging from image-editing software and virtual keyboards to calling apps and wallpaper collection apps.”

Related Posts