Close Menu
    Facebook X (Twitter) Instagram Pinterest YouTube LinkedIn TikTok
    TopBuzzMagazine.com
    Facebook X (Twitter) Instagram Pinterest YouTube LinkedIn TikTok
    • Home
    • Movies
    • Television
    • Music
    • Fashion
    • Books
    • Science
    • Technology
    • Cover Story
    • Contact
      • About
      • Amazon Disclaimer
      • Terms and Conditions
      • Privacy Policy
      • DMCA / Copyrights Disclaimer
    TopBuzzMagazine.com
    Home»Technology»Hunt for Lapsus$ Hackers Leads to a British Teen
    Technology

    Hunt for Lapsus$ Hackers Leads to a British Teen

    By AdminApril 22, 2022
    Facebook Twitter Pinterest LinkedIn Tumblr Email

    There are quiet weeks in the security world, and then there are weeks like this one. 

    Monday kicked off with the Lapsus$ extortion gang—a cybercriminal group so bizarre and with such high-profile targets that some people suspected they were Russian state-sponsored hackers—claiming that it had breached Okta, a popular authentication services company, just hours after it leaked source code for Microsoft’s Bing search, Bing Maps, and Cortana voice assistant. Given that Okta is used by some 14,000 companies, the news seemed “really, really bad,” as one security expert told WIRED. Okta’s fumbled messaging around the incident only made matters worse. Ultimately, the company said that hackers had accessed the accounts of an employee at third-party Okta subprocessor Sykes, potentially putting as many as 366 customers at risk. But, as we’ll get into below, that was only the start of Lapsus$’s eventful week.

    Russia’s tragic war against Ukraine, meanwhile, continues to overshadow all else. As the destabilizing destruction continues, we detailed the tightrope President Biden (and, by extension, the NATO alliance) must walk as Russian president Vladimir Putin grows increasingly isolated and the apparent likelihood of Russia claiming control of Ukraine dwindles. We also took a look back at the biggest hack to take place since the war began in late February. The attack, against the ground network of the KA-SAT satellite owned by US-based Viasat, bricked modems and otherwise knocked offline some 27,000 customers across Europe. The mystery of who carried out the attack, however, has reportedly been solved. (Hint: Russia.)

    The ceaseless saga of Russian hackers culminated on Thursday when the US Department of Justice unsealed a pair of indictments against alleged Russian government hackers who authorities say targeted US and international energy companies worldwide. One indictment focuses on three hackers said to work for Russian intelligence agency FSB, as part of a group known by security researchers as Berserk Bear, Dragonfly 2.0, and Havex. While Berserk Bear’s alleged hacking targeted nuclear facilities in the US, the group is not known to have caused any physical destruction as part of its hacking activities. The same cannot be said for the Russian hacker group known as Xenotime, which security researchers say caused disruptions at a Saudi oil refinery in 2017 and, according to the second indictment unsealed Thursday, targeted a US oil refinery with similarly dangerous intentions.

    Follow along for the latest on these stories and more in this week’s security news roundup.

    Soon after Lapsus$ claimed to have hacked Okta and leaked Microsoft source code (which Microsoft later confirmed), Bloomberg reported that security researchers identified the gang’s ringleader to be a teenager from Oxford, UK, who’s “so skilled at hacking—and so fast—that researchers initially thought the activity they were observing was automated.” Almost as quick were the arrests that followed: The BBC reported hours after Bloomberg’s report that City of London police arrested seven people, ages 16 to 21, in connection with Lapsus$ activity, which in addition to targeting Okta and Microsoft reportedly included hacking Samsung, Nvidia, EA, and Ubisoft. The 16-year-old identified by security researchers may or may not have been among the arrested group. Regardless, police reportedly released all seven without charges, and the gang’s chaotic energy has so far continued unabated.

    The main lingering question surrounding the Viasat satellite hack, which disrupted Ukranian military communications along with that of tens of thousands of civilian and corporate customers throughout Europe, was whodunnit? The answer, as expected, was Russia, according to unnamed US officials who spoke with The Washington Post. Specifically, the attack was reportedly instigated by the GRU, the Russian military intelligence agency. While the GRU is home to Sandworm, the hacker group responsible for carrying out devastating cyberattacks against Ukraine and unleashing the costly NotPetya cyberattack, it’s not known whether Sandworm hackers were involved in the Viasat hack.

    The White House on Monday warned US companies of “evolving intelligence that Russia may be exploring options for potential cyberattacks” in retaliation for US sanctions against Russia over its war against Ukraine. The White House offered few details but hinted at classified briefings for potential targets and urged companies to institute stronger security safeguards. Given the Biden administration’s tactic of releasing intelligence in the lead-up to Russia’s invasion of Ukraine last month that proved accurate, many assumed an attack could be imminent. As the week wore on, more details emerged: CNN reported that the FBI had warned five US energy companies that Russian hackers had scanned their networks—an early step often used to identify potential avenues of attack. And the US Cybersecurity and Infrastructure Security Agency held a call with more than 13,000 “industry ‘stakeholders’” to answer their questions and further encourage more robust security on corporate networks. 

    Russia isn’t the only country whose hackers have been busy. Google’s Threat Analysis Group this week revealed that North Korean hackers successfully exploited a zero-day vulnerability in the Chrome web browser for roughly a month before the company issued a patch. One campaign, which TAG researchers dubbed Operation Dream Job, targeted some 250 people in media and tech with fake job recruiter emails that included a link that, when clicked, would initiate the exploit kit. The other campaign, Operation AppleJeus, specifically targeted 85 people in cryptocurrency and fintech using the same exploit kit that was deployed in Operation Dream Job. While North Korean hackers have used similar tactics before, the revelation serves as a reminder to always update your apps.

    More Great WIRED Stories

    Read The Full Article Here

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    My X Account Was Hijacked to Sell a Fake WIRED Memecoin. Then Came the Backlash

    May 12, 2025

    Huawei unveiled its first laptop running HarmonyOS 5, after its Windows license for PCs expired in March 2025; the unnamed laptop uses Huawei's Celia assistant (Coco Feng/South China Morning Post)

    May 9, 2025

    Bhutan Partners With Binance to Launch Crypto Payment System for Tourists

    May 8, 2025

    Birdfy Nest Polygon Smart Birdhouse Review: Primed for Pictures

    May 7, 2025

    An AWS survey of 3,739 senior IT decision-makers across nine countries finds 45% plan to prioritize spending on generative AI in 2025, and 30% on cybersecurity (Todd Bishop/GeekWire)

    May 7, 2025

    Google Might Be Working On Connecting Apps With Gemini Live: Report

    May 6, 2025
    popular posts

    ‘The Crown,’ ‘Monarch: Legacy of Monsters’ & More That Top

    The Best 12 Tattoo Lotions to Heal and Maintain Your

    Illustrated Edition of THE HUNGER GAMES Coming Later This Year

    Organoids made from uterus fluid may help treat fetuses before

    What the Disease Feels Like, and Presidents Can’t End Pandemics:

    Scientists ‘supercharge’ cancer-fighting T cells

    Samaritan Soundtrack: Listen to a Track by Jed Kurzel &

    Categories
    • Books (3,213)
    • Cover Story (2)
    • Events (18)
    • Fashion (2,382)
    • Interviews (43)
    • Movies (2,512)
    • Music (2,790)
    • News (153)
    • Science (4,363)
    • Technology (2,506)
    • Television (3,235)
    • Uncategorized (932)
    Archives
    Facebook X (Twitter) Instagram Pinterest YouTube Reddit TikTok
    © 2025 Top Buzz Magazine. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms of Use and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
    Do not sell my personal information.
    Cookie SettingsAccept
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT