- The WicKed Web Weekly
- Posts
- Discord Levels Up Security, LAPSUS$ Teen Hackers Sentenced, Android's Lock Screen Woes, Cloud Atlas Targets Russian Enterprises, ,
Discord Levels Up Security, LAPSUS$ Teen Hackers Sentenced, Android's Lock Screen Woes, Cloud Atlas Targets Russian Enterprises, ,
In this evening's tech tales, we've traversed from Discord's security fortification 🛡️ to the sobering sentencing of young cybercriminals 🚨. The relentless maneuvers of Cloud Atlas in the realm of cyber espionage 🔍 and the revelation of a new vulnerability in Android's lock screen 🔓 remind us of the ever-evolving landscape of cybersecurity. As we chart these digital depths, it's essential to stay alert, informed, and proactive. Here's to keeping our digital lives secure and savvy! 🌐💻🔐 Stay tuned and stay safe! 🛡️🌟🔒
Tech Twilight Tidings In today's tech tales, we've traversed from Discord's security fortification 🛡️ to the sobering sentencing of young cybercriminals 🚨. The relentless maneuvers of Cloud Atlas in the realm of cyber espionage 🔍 and the revelation of a new vulnerability in Android's lock screen 🔓 remind us of the ever-evolving landscape of cybersecurity. As we chart these digital depths, it's essential to stay alert, informed, and proactive. Here's to keeping our digital lives secure and savvy! 🌐💻🔐 Stay tuned and stay safe! 🛡️🌟🔒

Discord Levels Up Security
Chat and gaming platform Discord has just upped its security game, introducing security key support for all users. Now, Discord aficionados can utilize WebAuthn for more secure sign-ins, a step beyond the traditional two-factor authentication (2FA) methods. This new feature, first tested with Discord employees using YubiKeys, is now globally available, making logins safer and more resistant to threats like credential theft and phishing.
How to Get Secured
To get started, Discord users can navigate to Settings > My Account > Register a Security Key in the app. This path allows the activation of hardware security keys or another second authentication factor, including biometric options like Windows Hello, FaceID, or Touch ID. It's a choice, not a mandate: users still have the freedom to stick with traditional OTP-based 2FA methods if they prefer.
The Bigger Picture: In the wake of rising cybersecurity threats, Discord's move to include hardware-based security keys as an additional layer of protection reflects a growing trend in digital security. It's a smart move for an app that's increasingly becoming a hub for online communities and gaming groups.

LAPSUS$ Teen Hackers Sentenced
The notorious LAPSUS$ cybercrime group, known for its high-profile corporate attacks, has seen two of its young British members sentenced. Arion Kurtaj, 18, from Oxford, received an indefinite hospital order due to concerns about his immediate return to cybercrime, while a 17-year-old member faced an 18-month-long Youth Rehabilitation Order.
A String of Cyber Attacks
LAPSUS$'s attack spree, running from August 2020 to September 2022, targeted major companies like Microsoft, NVIDIA, and Uber. The group's tactics included SIM-swapping to hijack accounts and infiltrate networks, along with using a Telegram channel for operations publicity and victim extortion.
Global Reach: The group, with members in the U.K. and Brazil, is part of the larger entity 'the Comm', which the FBI describes as a diverse and organized collective engaging in various cybercrimes.
The Cautionary Tale: These sentences highlight the risks and consequences of online activities, especially for youth drawn to the digital world's darker aspects. The City of London Police's Amanda Horsburgh emphasized the importance of understanding these dangers, stating, "Many young people wish to explore how technology works... Unfortunately, the digital world can also be tempting to young people for the wrong reasons."
This case underscores the growing concern over youth involvement in cybercrime and the need for awareness and education in the digital age.

Cloud Atlas Targets Russian Enterprises
The elusive cyber espionage group Cloud Atlas has been linked to spear-phishing attacks against Russian organizations, including an agro-industrial enterprise and a state-owned research company. Active since at least 2014 and also known as Clean Ursa, Inception, Oxygen, and Red October, Cloud Atlas specializes in multi-stage cyberattacks targeting various countries.
The Art of Deception
These attacks often start with a phishing email containing a malicious document, exploiting a Microsoft Office vulnerability (CVE-2017-11882) to deploy payloads like PowerShower and DLLs communicating with a remote server. This methodology, which Cloud Atlas has been using since 2018, highlights their preference for simplicity and effectiveness over sophisticated methods.
Stealth and Strategy: Cloud Atlas' strategy involves avoiding detection by using one-time payload requests and legitimate cloud storage. They steer clear of open-source implants and common network and file attack detection tools, instead relying on well-documented software features, particularly in Microsoft Office.
Recent Developments: F.A.C.C.T. noted a similar attack pattern in recent incidents, with RTF template injection leading to obfuscated HTA file execution and remote VBS code retrieval. These attacks underline the group's continued activity and evolving tactics.
This ongoing situation raises critical questions about cybersecurity preparedness and the need for constant vigilance against such sophisticated threats.

Android's Lock Screen Woes
Attention, Android 13 and 14 users! A new lock screen bypass vulnerability has been discovered, putting your data at risk. Security researcher Jose Rodriguez revealed this flaw, which allows anyone with physical access to exploit it and access sensitive information like Google account data, photos, contacts, and more.
A Troubling Flaw
This bypass works by exploiting Google Maps on the lock screen of Android 13 and 14 devices. It allows unauthorized access to the device, depending on the Google Maps configuration. With Driving Mode disabled, an attacker can access locations and contacts, while enabling it grants further access to the Google account.
Patch Incoming, But Not Yet: Google is aware of the issue and plans to address it in the February 2024 update. Until then, the recommendation is to uninstall Google Maps to prevent exploitation.
This vulnerability underscores the importance of maintaining security updates and the potential risks of seemingly innocuous features.