- The WicKed Web Weekly
- Posts
- Twilio Phases Out Authy Desktop App
Twilio Phases Out Authy Desktop App
Netgear and Hyundai Fall Victim to Crypto Scams, Twilio Phases Out Authy Desktop App, Capital Health Targeted by LockBit Ransomware
Evening Brew: A Cybersecurity Roundup
Tonight, we're diving into a whirlwind of cyber challenges. First up, Netgear and Hyundai's Twitter accounts became pawns in a cryptocurrency scam, a sharp reminder of social media vulnerabilities. Then, Twilio's Authy bids farewell to desktop apps, marking a significant shift towards mobile-first cybersecurity. And lastly, we untangle the LockBit ransomware's attack on Capital Health, showcasing the growing cyber threats faced by healthcare institutions. As we navigate this digital landscape, let's stay vigilant and keep our cyber defenses strong. Here's to a secure and aware evening! 🌐🔒🍵

Netgear and Hyundai Fall Victim to Crypto Scams
Twitter has become a battleground for cybersecurity with Netgear and Hyundai's official Twitter accounts being the latest casualties. With a combined following of over 160,000, these accounts were hijacked to propagate cryptocurrency wallet drainer malware scams.
Hyundai's swift response: Hyundai MEA quickly regained control of their account, removing all malicious links. They were impersonated as Overworld, a Binance Labs-backed multiplayer RPG, often targeted in similar scams.
Netgear still compromised: Netgear's Twitter account, compromised since January 6th, has been used to bait users with a $100,000 lure to a harmful site that steals assets and NFTs from connected wallets.

Increasing trend of verified account hacks: Hackers are now frequently targeting verified business and government Twitter accounts to lend credibility to their malicious schemes. These include phishing sites and crypto drainers. Even web3 security firm CertiK and Google's Mandiant have been affected, despite 2FA protections.
A lucrative criminal enterprise: A single wallet drainer named 'MS Drainer' amassed about $59 million from 63k victims in just eight months. Twitter users actively involved in the cryptocurrency space are particularly at risk, constantly bombarded by these malicious campaigns.
Insights: Despite attempts to contact, Netgear and Hyundai spokespersons were unavailable for comment. As this digital warfare escalates, users are urged to be vigilant, especially when interacting with seemingly legitimate but compromised accounts.

Twilio Phases Out Authy Desktop App
End of an era for desktop 2FA: Twilio announced the discontinuation of its Authy desktop apps for Windows, macOS, and Linux, slated for August 2024. This move urges users to shift to the mobile version of the two-factor authentication (2FA) app.
Authy's key features: Authy, popular for its offline code generation, cross-device syncing, cloud backups for account recovery, and strong token encryption, will now focus solely on its mobile application.
Twilio's strategic shift: Amidst internal restructuring and the recent departure of co-founder Jeff Lawson, Twilio is redirecting resources to more in-demand areas. "This is a strategic move to enhance our existing product solutions," stated Twilio.
Guidance for users: Desktop users are advised to transition to the iOS or Google app, with special mention that M1/M2 Apple computer users can still download the iOS version. The syncing feature of Authy ensures a smooth transfer of tokens from desktop to mobile.
For third-party platforms: Those using Authy's API need to inform their users about the upcoming change well before the August deadline.
Alternative solutions: Twilio suggests various desktop 2FA apps, like 1Password, KeepassXC, and Authenticator, for those unable or unwilling to switch to mobile.
A cautionary note: Users transitioning to other 2FA apps must first disable Authy on each platform before setting up the new app. It's essential to avoid deleting Authy tokens prematurely to prevent account lockout.
A critical transition: This change represents a significant shift in Twilio's approach to cybersecurity, emphasizing the growing importance of mobile-centric solutions. Users need to take careful steps during this transition to ensure continued access to their accounts.

Capital Health Targeted by LockBit Ransomware
A major healthcare provider under siege: Capital Health, serving New Jersey and parts of Pennsylvania, faced a cyberattack in November 2023, disrupting its IT systems and operations. The LockBit ransomware gang has now claimed responsibility for this attack, threatening to release seven terabytes of sensitive medical data.

LockBit's strategy: Interestingly, the gang claims they refrained from encrypting Capital Health's files, focusing solely on data theft to avoid disrupting patient care. This move aligns with LockBit's stated affiliate rule of avoiding encryption in hospital networks.
Ethical lines blurred: While most ransomware groups advise against targeting healthcare providers, LockBit has a history of attacking such institutions, including the SickKids cancer hospital and several others. Their approach of data theft without encryption creates a misleading narrative of 'harmless' attacks, ignoring the potential catastrophic outcomes.
Widespread impact in healthcare: The healthcare sector has been increasingly targeted by high-impact ransomware attacks, leading to system outages, data breaches, and financial losses. Other recent victims include Ardent Health Services and the Fred Hutchinson Cancer Center.
A looming threat: With the ransomware deadline approaching, Capital Health faces a critical situation. Despite restoring operations and strengthening security measures, the potential data leak remains a significant threat to patient privacy and institutional integrity.
A cautionary tale: This incident highlights the evolving nature of cyber threats in the healthcare sector, underscoring the need for robust cybersecurity measures and vigilant monitoring to protect sensitive data and maintain uninterrupted healthcare services.