Biznab
𝕏fin

Europol Shuts Down VPN Service Used by Two Dozen Ransomware Gangs

Europol announced the takedown of a VPN service that provided anonymity to hackers, including two dozen ransomware groups. Users of the service have been notified that their identities are now known to law enforcement.

Biznab Editor
·
Europol Shuts Down VPN Service Used by Two Dozen Ransomware Gangs

Europol has dismantled a VPN service that marketed itself to cybercriminals as a tool for complete anonymity. The operation, details of which were released on Wednesday, targeted a service that law enforcement says was used by at least two dozen ransomware gangs. The VPN provider had explicitly promised hackers that their activities would remain untraceable.

Authorities were able to identify users of the service and have begun notifying them that their anonymity has been compromised. Europol did not disclose the name of the VPN service or the number of users affected, but confirmed that the takedown was part of a broader effort to disrupt ransomware operations.

The VPN service operated on a model that allowed customers to pay with cryptocurrency and required no personal information. This made it attractive to cybercriminals seeking to hide their IP addresses and locations while conducting attacks. Europol coordinated with law enforcement agencies from multiple countries to seize the service's infrastructure.

Ransomware groups have increasingly relied on such anonymizing services to evade detection. The takedown is expected to hinder the operations of several prominent ransomware strains, including those responsible for high-profile attacks on hospitals, schools, and corporations. Europol stated that the investigation is ongoing and further arrests are possible.

The notification to users serves as a warning that law enforcement is capable of penetrating even the most secretive services. Europol encouraged any individuals who used the VPN for legitimate purposes to come forward, but emphasized that the service was primarily marketed to criminals.

This action follows a series of similar takedowns by international law enforcement, including the seizure of dark web marketplaces and cryptocurrency exchanges used by ransomware gangs. Europol has made combating ransomware a top priority, citing the significant economic and societal damage caused by these attacks.

The VPN service's operators face charges related to computer fraud, money laundering, and conspiracy. Europol did not provide a timeline for their prosecution but confirmed that the service is no longer operational. Users who relied on the VPN for illegal activities have been advised that their data may have been compromised.

Europol's announcement underscores the growing collaboration between global law enforcement agencies in the fight against cybercrime. The agency stated that it will continue to target the infrastructure that enables ransomware attacks, including bulletproof hosting services and cryptocurrency tumblers. The takedown of this VPN service marks a significant victory in that effort.

💡 Try our tool for this topic

Blur Face

Blur private areas in photos

Next Story

Workplace monitoring apps share employee data with ad platforms, study finds

A new study led by Columbia Law School's Stephanie Nguyen found that nine workplace monitoring tools share employee data with third parties including Facebook and Google. The data ranges from names and email addresses to web browsing history.

Biznab Editor
·
Workplace monitoring apps share employee data with ad platforms, study finds

A study released Tuesday reveals that many workplace monitoring applications transmit employee data not only to employers but also to digital advertising platforms and data brokers. The research, led by Stephanie Nguyen, a senior fellow at Columbia Law School's Center for Law and the Economy and former chief technologist at the Federal Trade Commission under Lina Khan, examined nine popular "bossware" services. All nine were found to share some form of information with third-party platforms, according to the report.

The data shared includes names, email addresses, and web browsing history. Recipients of this data include major ad platforms such as Facebook and Google. The study did not name the specific bossware services but noted that they are used by hundreds of thousands of workplaces to monitor employee activity.

Nguyen's review highlights a growing concern about privacy in the workplace as remote and hybrid work models become more common. Employee monitoring software often tracks keystrokes, screenshots, and time spent on tasks, but the extent of data sharing with third parties has been less understood.

The findings come amid increased regulatory scrutiny of data privacy practices. The FTC has been active in pursuing cases against companies that misuse consumer data, and the study suggests that workplace monitoring tools may be operating in a gray area of consent and transparency.

Employers using these tools may not be fully aware of the data-sharing practices, the study suggests. The report calls for greater transparency from bossware providers and clearer disclosures to both employers and employees about how data is used and shared.

Representatives from Facebook and Google did not immediately respond to requests for comment. The study's authors recommend that companies review their monitoring software contracts and data-sharing policies to ensure compliance with privacy regulations.

The full study is available on the Columbia Law School website. Nguyen and her team plan to expand the research to include more bossware services and examine the legal implications of the data-sharing practices they uncovered.

Block Rush Pro
Block Rush Pro
Next Story

Trump Mobile Data Leak Exposes Customer Addresses, Emails

Trump Mobile is reportedly leaking customers' email and home addresses, with two YouTubers claiming to have verified the authenticity of the exposed data. The company has not responded to alerts about the breach.

Biznab Editor
·
Trump Mobile Data Leak Exposes Customer Addresses, Emails

Trump Mobile, a mobile virtual network operator (MVNO) associated with former President Donald Trump, is facing allegations of a data leak that exposes customers' personal information. Two YouTubers have reported that the company is leaking email and home addresses, and that Trump Mobile has not responded to individuals who alerted the company about the exposure. The YouTubers stated they verified that their own leaked data was authentic, raising concerns about the security of customer information.

The alleged leak involves sensitive personal details, including email addresses and physical home addresses, which could be used for identity theft or targeted harassment. The YouTubers, who have not been named in the reports, claimed they discovered the data exposure and attempted to notify Trump Mobile but received no response. The company's silence has intensified scrutiny over its data protection practices.

Trump Mobile operates as an MVNO, meaning it resells wireless services from major carriers under its own brand. The company markets itself to supporters of Donald Trump, offering plans that emphasize conservative values. The alleged data breach could undermine trust among its customer base, which includes politically engaged individuals who may be particularly concerned about privacy.

The YouTubers did not specify how they discovered the leak or the extent of the data exposure. However, they asserted that the leaked information matched their own personal details, confirming the breach's validity. Without a response from Trump Mobile, it remains unclear how many customers may be affected or what steps the company is taking to address the issue.

Data breaches involving MVNOs are not uncommon, as these companies often rely on third-party infrastructure and may have less robust security measures than major carriers. The exposure of email and home addresses can lead to phishing attacks, doxxing, or other forms of cyber exploitation. Customers of Trump Mobile are advised to monitor their accounts and be cautious of unsolicited communications.

As of now, Trump Mobile has not issued a public statement regarding the alleged leak. The company's website and social media channels have not addressed the reports. The YouTubers have called on the company to acknowledge the breach and take corrective action to protect customer data.

The Federal Trade Commission (FTC) and other regulatory bodies have not commented on the incident. If the leak is confirmed, Trump Mobile could face legal consequences under data protection laws, including potential fines for failing to safeguard consumer information. The company's lack of response may also lead to reputational damage and customer attrition.

Customers who believe their data may have been exposed are encouraged to change passwords, enable two-factor authentication, and report any suspicious activity to authorities. The YouTubers have urged Trump Mobile to notify affected individuals and implement stronger security measures to prevent future breaches.

Fireball Burn
Fireball Burn
Next Story

Trump Mobile accused of leaking customer addresses and phone numbers

Trump Mobile has been accused of insecurely storing customer data, exposing addresses and phone numbers. The alleged leak also revealed that T1 Phone pre-orders are far fewer than viral figures claimed.

Biznab Editor
·
Trump Mobile accused of leaking customer addresses and phone numbers

Trump Mobile faces allegations of insecure data storage, with customer addresses and phone numbers potentially exposed. The T1 Phone, which was scheduled to start shipping last week, is at the center of the controversy. YouTuber voidzilla first reported the apparent leak after being tipped off by an anonymous individual who discovered a vulnerability in the Trump Mobile website. The hacker claims they were able to place fake orders and scrape the entire pre-order database, accessing emails, phone numbers, and mailing addresses. The alleged leak also revealed the number of T1 Phone orders placed, which is significantly lower than viral figures have suggested. Trump Mobile has not yet commented on the allegations. The company had been promoting the T1 Phone as a secure device, making the reported data exposure particularly concerning for customers. The full story is available at The Verge.

Space Hero X
Space Hero X
Next Story

GitHub Confirms Hackers Stole Data from Internal Repositories

GitHub reported that attackers accessed and exfiltrated data from thousands of its internal repositories. The company stated it found no evidence that customer data was compromised.

Biznab Editor
·
GitHub Confirms Hackers Stole Data from Internal Repositories

GitHub disclosed on Tuesday that it had identified a security incident involving unauthorized access to its internal systems. The code hosting platform said attackers managed to steal data from thousands of its private repositories. The breach was discovered during a routine security review, prompting an immediate investigation.

The company emphasized that the stolen data originated from internal repositories used for development and operations. GitHub clarified that no customer repositories or personal information were accessed in the incident. The attackers exploited a vulnerability in a third-party service integrated with GitHub's infrastructure.

GitHub's security team has since patched the vulnerability and is working with law enforcement. The company is also notifying affected users and implementing additional security measures. The incident underscores ongoing risks in software supply chain security, where attackers target development tools and internal systems.

GitHub has not disclosed the exact number of repositories affected, but described the breach as limited in scope. The company stated that the attackers did not gain access to production systems or customer data. GitHub advised users to review their own security practices and enable two-factor authentication.

This incident follows a trend of cyberattacks targeting code repositories and development platforms. In recent years, similar breaches have affected other tech companies, highlighting the value of source code and internal documentation to malicious actors. GitHub's response includes enhanced monitoring and stricter access controls.

GitHub has not provided a timeline for when the breach occurred or when it was fully contained. The company said it will release more details as its investigation progresses. Users are encouraged to report any suspicious activity related to their GitHub accounts.

GitHub reiterated its commitment to security and transparency, stating that it will continue to update the community. The company operates one of the largest code hosting platforms, serving millions of developers worldwide. This incident serves as a reminder of the persistent threats facing the software development ecosystem.

Related News