Device code attacks, phone TOAD solution, more telecoms breached
Feb 17, 2025
auto_awesome
Hackers are targeting users with device code phishing attacks, raising alarms about email theft. In response, an innovative Anti-TOAD feature is being developed to thwart in-call sideloading attempts. Meanwhile, Chinese hackers continue to breach U.S. telecoms using unpatched Cisco routers, exposing the need for enhanced security measures. The discussion also touches on the IRS's acquisition of an NVIDIA SuperPod AI supercomputer, aiming to bolster fraud detection and highlight the ongoing battles in the cybersecurity landscape.
Device code phishing attacks pose a significant threat to sensitive data, targeting organizations using vulnerable Internet of Things devices and exploiting social engineering tactics.
The introduction of the Anti-TOAD security feature aims to safeguard users from phone scams that manipulate device settings for malware installation.
Deep dives
Device Code Phishing Threats
Hackers are utilizing device code phishing to target various sectors, including government, NGOs, healthcare, and telecommunications across multiple regions. This technique exploits devices like smart TVs and Internet of Things (IoT) devices that require login codes but lack traditional input methods. By employing social engineering tactics, cybercriminals can gain unauthorized access to these codes, compromising sensitive organizational data. Microsoft is monitoring these threats and has labeled the group responsible as Storm237, indicating a growing concern over such sophisticated phishing methods.
New Security Features and Breaches
A new security feature for Android, known as Anti-TOAD, aims to prevent users from unintentionally compromising their devices during phone calls with scammers. This feature responds to a scam known as Telephone-Oriented Attack Delivery, which involves cybercriminals convincing users to change settings to permit malware installation. Additionally, unpatched Cisco routers have been exploited in breaches executed by the Salt Typhoon Group from China, revealing vulnerabilities that have affected multiple telecommunications providers. Lastly, a security breach at PPL Electric Utilities, attributed to a third-party vendor, underscores the threat posed by data leaks despite the utility company's core systems remaining unaffected.
1.
Recent Cybersecurity Threats and Protective Measures
Hackers steal emails in device code phishing attacks
Anti-TOAD feature seeks to prevent in-call sideloading attacks
Chinese hackers breach more U.S. telecoms via unpatched Cisco routers
Thanks to today's episode sponsor, Scrut Automation
Scrut Automation allows compliance and risk teams of any size to establish enterprise-grade security programs. Their best-in-class features like process automation, AI, and over 75 native integrations reverse compliance debt and help manage risk proactively as your business grows. Visit scrut.io to schedule a demo or learn more. That’s www.scrut.io.
Get the Snipd podcast app
Unlock the knowledge in podcasts with the podcast player of the future.
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode
Save any moment
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Share & Export
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode