Inside The Russian Cybergang Thought To Be Attacking Ukraine—The Trickbot Leaks

Reports concerning the impact of cyber operations, directed at both Russian and Ukrainian targets, have been many and varied. While it’s a step too far, in the eyes of most experts, to describe what has been happening as cyber warfare, it’s certainly accurate to suggest that ongoing cyber incidents are a reality. Beyond the ever-present disinformation campaigns, a highly organized cybercrime group appears to have entered the field of conflict. In an apparent change of tactics from being a purely financially motivated criminal business, this Russian cybergang is thought to be Trickbot.

Exclusive: The Trickbot Leaks

I can exclusively report that threat intelligence specialist Cyjax has today published an in-depth analysis delving deep into the heart of the Trickbot cybergang. Months of painstaking research through hundreds of leaked documents has resulted in what is possibly the most comprehensive breakdown of a significant international cybercrime syndicate I’ve seen. Covering everything from membership and management to operational infrastructure, these are the Trickbot Leaks.

MORE FROM FORBESLeaks Confirm Ransomware Surge As Dangerous New Gangs Take Over

The Russian invasion of Ukraine was the catalyst for cybergang chaos

Russian cybercrime groups were not only placed into a difficult position at the start of what Putin still refers to as a special military operation but what proved to be an impossible one. Although working out of Russia and likely with the state turning a blind eye to their activities if not actively sponsoring them, many of these groups comprised both Russian and Ukrainian nationals. The Conti cybercrime group, one of the most successful ransomware operators, was no exception. The day after the invasion, it posted a declaration officially offering full support to the Russian government and pledging to use “all possible resources to strike back at the official infrastructures” of anyone, or any country, targeting Russia in a cyberattack scenario.

MORE FROMFORBES VETTED

Needless to say, this was something akin to kicking a hornet’s nest: Conti had Ukrainian members who did not support the Russian operation, and the global intelligence community had little choice but to take a renewed interest in the group. Within 48 hours, Conti retracted the statement and pledged only to target Western warmongers, as they put it. However, the seeds of discontent were already sewn, and that same day an account called ContiLeaks started posting logs of internal Conti communications to Twitter. Cyjax was able to access a dump of some 60,000 such messages. A few days later, on 4 March, another account called Trickleaks posted that it had evidence of collaboration between Trickbot and the Federal Security Service (FSB), the primary security service in Russia.

The Trickbot Leaks eventually consisted of more than 1,000 communication extracts, 250,000 messages, 2,500 IP addresses, and 500 potential crypto wallet addresses. PDF files were also leaked, Cyjax reports, “containing large amounts of information” that appeared to be about individual members. These became known in-house as the Doxing PDF files.

Analyzing the leaks: delving deep inside the Trickbot cybergang

MORE FROM FORBESU.S. Cybersecurity Agency ‘Strongly Urges’ You Patch These 75 Actively Exploited Flaws

The Trickbot Leaks make the Conti disclosures all but pale into insignificance, being not only four times the size but containing much more helpful information from the threat intelligence perspective. Of course, researching and analyzing this data was far from a straightforward task. Cyjax had to develop a bespoke set of tools and processes. By way of example, standard language translation tools encountered difficulty in dealing with slang and nuance. One Russian word that directly translates to toad was actually referring to the Jabber messaging service. “While this research took time and required the development of bespoke tools to analyze the data,” Joe Wrieden, the primary intelligence analyst at Cyjax involved in the report, told me, “I feel we have uncovered some key information that will help shape the way we view threat actors such as Trickbot. I was surprised by the level of sophistication, not only from a technical standpoint with malware and infrastructure but also with the complex management systems used to run the organization.”

The key findings of this deep dive into the Trickbot Leaks, and consequently the criminal cybergang itself, can be divided into three areas: members, operational infrastructure, and business management.

Trickbot members

The sheer quantity and quality of personal information leaked about members of the Trickbot organization was genuinely unprecedented. Cyjax analysts say they could determine overall member counts (at least 133 individuals) and locations, position within the gang, dates of birth, tax details, passport numbers, email and other contact details, and more. These Doxing PDFs appear to have combined open source intelligence (OSINT) data with insider knowledge. “It is clear whoever is behind this leak was either very close to the group itself,” the report states, “or had broad access to the group’s records.” In conversation with Chris Spinks, head of operations at Cyjax, he expressed surprise “given the level of personal detail in these leaks and the resources of the U.S. Department of Justice as well as Europol,” that “indictments have not been raised against the majority of these named threat actors.”

Trickbot business management

It became evident, very quickly, that Trickbot is not a ragtag collection of some criminal actors who are also proficient coders. “This is a large business which operates at a commercial level,” Cyjax states. This means it comes complete with a human resources system and salaried employees. The analysis reveals that Trickbot even has access to lawyers and, Cyjax concludes, is “very much a criminal advanced persistent threat” operation. Most developers recruited into Trickbot were salaried at around $2,000 per month and allocated line managers. Efficient payment systems are used to encourage work of high quality. This is especially important in ensuring that development teams are agile enough to quickly evolve the malware in response to commercial cybersecurity defenses and, more often than not, negate them.

Trickbot members were found to be organized into distinct groups by role, managed by senior players. So, there was a crypter group developing malware obfuscation tools and a locker group responsible for developing “fast and efficient encryption systems” to be built into both ransomware payloads and wiper malware. Inter-group collaboration is another essential part of the business strategy. Trickbot works alongside other cybercrime outfits to improve their technical capabilities and gain reputational leverage within the broader criminal community.

MORE FROM FORBESLaw Enforcement Email Opens Floodgate For Police Hackers

Trickbot operational infrastructure

Regarding the technical stuff, the operational infrastructure employed by the Trickbot cybergang, among the more critical components are bots and loaders. These support both the group’s management structure and effective malware distribution. The bots host malicious files for phishing and attack vectors. The loaders, meanwhile, take care of the command and control functions and delivery of secondary payloads. Multiple other server hosts were identified, which took on roles such as malware development, antivirus, and crypter detection testing, and various proxies to add further protective layers to the operation.

“We see the threat actors actively building bespoke exploits to defeat antivirus with an in-house capability,” Spinks says. “We also see they are willing to reach out when they cannot develop things fast enough. Reliance on singular defense mechanisms such as antivirus or single vendor cover is clearly not providing the defensive layering needed to prevent this threat from gaining traction within the networks.”

IBM’s X-Force intelligence team says Trickbot is now actively aiming at Ukrainian targets

According to the latest analysis from IBM’s X-Force intelligence team, Trickbot has been systematically attacking Ukrainian targets. X-Force tracks the Trickbot group as ITG23 and confirms that the recent anti-Ukraine campaigns “differ from historical precedent” and are aimed at a wide range of state, business, and individual targets. The recent activity, X-Force analysts, stated, “highlights a trend of this group choosing targets that align with Russian state interests against the backdrop of the ongoing conflict.”

Then there’s the small matter of Conti. Until recently, the most successful and undoubtedly best-known of the ransomware groups, Conti, apparently shut down its infrastructure back in May, but things are not always what they seem in this murky criminal world. One industry expert working on the frontline of offensive security put it, the threat and people behind them within Conti haven’t gone away; it’s all just franchises and brands. Conti had been vocal in its support of targeting those working against the Russian Federation during the invasion of Ukraine. Before the shutdown, Conti was also reported to have gotten involved with the Trickbot operation as well. If Russian Conti ‘patriots’ are involved with Trickbot now, that could explain the apparent shift from purely a criminal business to one aligned with Russian state interests.

MORE FROM FORBESNew 0Day Hack Attack Alert Issued For All Windows Users

Remember I just said that things are not always what they seem? Yes, we have to return there. “We have had several discussions around the state-sponsored factor. There is not enough evidence within the leak to provide clarity in this matter; however, for sure, inference can be drawn,” Spinks told me. He says that what’s interesting is understanding the nuance between state-sponsored and state-supported. “Maybe these are two factors that have influenced the deployment of key individuals and tools into the Russian cyber offensive,” Spinks continues, “and maybe the ability to draw on these tools when required is the payoff for operating without prosecution?” Ultimately, though, the truth is at this point, we don’t know for sure. If it isn’t already a time-served cybersecurity industry adage, it should be: attribution is a bitch.

The Trickbot Leaks: in conclusion

Sun Tzu famously wrote:

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”

“This research helps businesses know the enemy,” Spinks says, “through a better understanding of the dynamic nature and capability within the threat group and a more thorough understanding of the processes undertaken by the threat actors around reconnaissance and targeting and indeed recruitment.”

I will leave the final words to Cyjax intelligence analyst Joe Wrieden, though: “The crossover between the higher-ups of Conti and Trickbot paints a picture of a new threat landscape that is highly interconnected and capable, and one where threat actors work together for a common goal.” Research and analysis such as this in-depth dive into the Trickbot cybergang, “enables businesses and researchers to appropriately manage the risk these threat actors pose, in a scenario where it is a cybercrime business versus your business.”

Warning—Massive New Security Update For 3.2 Billion Google Chrome Users Confirmed

More From Forbes

Facebook’s New Nightmare—Is It Time To Delete Your Account?“,”scope”:{“topStory”:{“index”:1,”title”:”Facebook’s New Nightmare—Is It Time To Delete Your Account?”,”image”:”https://specials-images.forbesimg.com/imageserve/626ab2059c8c57bb9ddeb21d/960×0.jpg”,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Apr 28, 2022″,”hourMinute”:”11:54″,”amPm”:”am”,”isEDT”:true},”uri”:”https://www.forbes.com/sites/kateoflahertyuk/2022/04/28/facebooks-new-nightmare-is-it-time-to-delete-your-account/”}},”id”:”inq94gjcci6o0″},{“textContent”:”

Internet Shutdowns Rocket As Governments Crack Down On Dissent“,”scope”:{“topStory”:{“index”:2,”title”:”Internet Shutdowns Rocket As Governments Crack Down On Dissent”,”image”:”https://specials-images.forbesimg.com/imageserve/626a5732644a9f95865f6824/960×0.jpg”,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Apr 28, 2022″,”hourMinute”:”05:00″,”amPm”:”am”,”isEDT”:true},”uri”:”https://www.forbes.com/sites/emmawoollacott/2022/04/28/internet-shutdowns-rocket-as-governments-crack-down-on-dissent/”}},”id”:”a9m98dib9ad400″},{“textContent”:”

Ransomware Criminals Strike American Dental Association“,”scope”:{“topStory”:{“index”:3,”title”:”Ransomware Criminals Strike American Dental Association”,”image”:”https://specials-images.forbesimg.com/imageserve/62698f49ea075e28585a6d82/960×0.jpg”,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Apr 27, 2022″,”hourMinute”:”02:47″,”amPm”:”pm”,”isEDT”:true},”uri”:”https://www.forbes.com/sites/leemathews/2022/04/27/ransomware-criminals-strike-american-dental-association/”}},”id”:”526qn9na9oe400″},{“textContent”:”

Google Details 2 ‘Impressive’ Zero-Day iOS/iMessage Security Exploits In New Report“,”scope”:{“topStory”:{“index”:4,”title”:”Google Details 2 ‘Impressive’ Zero-Day iOS/iMessage Security Exploits In New Report”,”image”:”https://specials-images.forbesimg.com/imageserve/624d33f68791738fafea5453/960×0.jpg?cropX1=0&cropX2=1317&cropY1=75&cropY2=816″,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Apr 26, 2022″,”hourMinute”:”06:45″,”amPm”:”am”,”isEDT”:true},”uri”:”https://www.forbes.com/sites/daveywinder/2022/04/26/google-confirms-record-breaking-14-serious-chrome-security-exploits-surprise-in-new-report/”}},”id”:”7ib0f31l71h400″},{“textContent”:”

This Is The Best Way To Cheat At Wordle“,”scope”:{“topStory”:{“index”:5,”title”:”This Is The Best Way To Cheat At Wordle”,”image”:”https://specials-images.forbesimg.com/imageserve/6263aac758f7b38edcdfe6c9/960×0.jpg?cropX1=0&cropX2=243&cropY1=0&cropY2=137″,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Apr 23, 2022″,”hourMinute”:”06:30″,”amPm”:”am”,”isEDT”:true},”uri”:”https://www.forbes.com/sites/zakdoffman/2022/04/23/wordle-reveals-surprise-google-chrome-edge-and-firefox-issue-on-apple-iphone-ipad-android-and-windows-10-11/”}},”id”:”4d6r4me10j6o00″},{“textContent”:”

Apple Just Issued A Stunning $12 Billion Blow To Facebook“,”scope”:{“topStory”:{“index”:6,”title”:”Apple Just Issued A Stunning $12 Billion Blow To Facebook”,”image”:”https://specials-images.forbesimg.com/imageserve/620f7fa29d43b9a835629454/960×0.jpg?cropX1=0&cropX2=3211&cropY1=172&cropY2=1978″,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Apr 23, 2022″,”hourMinute”:”06:30″,”amPm”:”am”,”isEDT”:true},”uri”:”https://www.forbes.com/sites/kateoflahertyuk/2022/04/23/apple-just-issued-stunning-12-billion-blow-to-facebook/”}},”id”:”d5rfh8ebroo000″},{“textContent”:”

Legal Consequences For Covid Monitoring Emerging“,”scope”:{“topStory”:{“index”:7,”title”:”Legal Consequences For Covid Monitoring Emerging”,”image”:”https://specials-images.forbesimg.com/imageserve/6262c26b142aec30de899ea0/960×0.jpg?cropX1=0&cropX2=1477&cropY1=2&cropY2=832″,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Apr 22, 2022″,”hourMinute”:”11:09″,”amPm”:”am”,”isEDT”:true},”uri”:”https://www.forbes.com/sites/stewartroom/2022/04/22/legal-consequences-for-covid-monitoring-emerging/”}},”id”:”3rebl877h97800″}],”breakpoints”:[{“breakpoint”:”@media all and (max-width: 767px)”,”config”:{“enabled”:false}},{“breakpoint”:”@media all and (max-width: 768px)”,”config”:{“inView”:2,”slidesToScroll”:1}},{“breakpoint”:”@media all and (min-width: 1681px)”,”config”:{“inView”:6}}]};

Emergency Security Update For 3.2 Billion Google Chrome Users—Attacks Underway

April 17 Update below. This post was originally published on April 14

Google has now released three emergency, out-of-band, security updates for the Chrome browser in as many weeks. What’s more this one, like the first, is to fix a high-severity zero-day vulnerability that is already being exploited by attackers.

Three emergency Google Chrome security updates in three weeks

Google issued yet another emergency security update for all 3.2 billion users of the Chrome web browser. The third such update, which discloses a single high-severity vulnerability, to be rushed out in three weeks. This one, like the first of this worrying threat triumvirate, is a zero-day vulnerability: one that Google has confirmed is already being exploited by attackers.

How serious is CVE-2022-1364?

The similarities don’t end there though. CVE-2022-1364, the vulnerability in question, is another ‘Type Confusion in V8’ one. This means it impacts the JavaScript engine that is employed by Chromium-powered browsers such as Google Chrome, Microsoft Edge, Brave and others. As before, Google is not making any further technical details available, and the update confirmation states that “we will also retain restriction” which suggests this is a particularly serious vulnerability indeed.

The security update process will have already started and the fix should become available to you in the course of the coming days and weeks. This emergency update takes Chrome to version 100.0.4896.127, across the Windows, Mac and Linux desktop platforms. Users of browsers such as Microsoft Edge, Brave, Vivaldi and Opera are advised to be alert to likely updates for those becoming available shortly.

MORE FOR YOU

MORE FROM FORBESGoogle Suddenly Issues New Emergency Security Update For 3.2 Billion Chrome Users

Oddly, the Google update announcement states that it includes two security fixes but only actually lists CVE-2022-1364 as disclosed by Clément Lecigne who works with the Google Threat Analysis Group. The seriousness of this vulnerability is highlighted yet again by the fact that it was reported to Google April 13 and the security update released the following day. That’s a very welcome, but equally unusual, fast turnaround.

I have reached out to Google for a statement.

Google vulnerability disclosure system working as intended

As I have said before, this doesn’t equate to poor security from Google, quite the opposite in fact. The maturity of the Google Chrome security program is evidenced by the discovery and remediation of these vulnerabilities. It is proof that the vulnerability disclosure system is working and working well. Of course, it would better if there were no such high-severity vulnerabilities in the code to start with, but the truth of the matter is we don’t live in an ideal world where mistakes are not made.

MORE FROM FORBESThese 6 Dangerous Phone Apps Need To Be Deleted Immediately

How to apply the Google Chrome security patch

Chrome should automatically update itself as the fix becomes available to you. However, you are advised to kickstart the updating process as soon as possible given that attacks are underway.

Head for the Help|About option in your Google Chrome menu. If your version of Chrome is not showing as 100.0.4896.127 then it will be vulnerable to the known exploit. The update should, however, now start downloading automatically. It may take a few days for the update to reach everyone, so be patient if you are not seeing it yet.

Also, remember to restart your browser after the update has been installed, or it will not activate, and you will still be vulnerable to attack.

Update April 15: Good news for Brave users, the update is already rolling out. My copy of Brave updated this morning as you can see in the screenshot below. Just go to the ‘About Brave’ entry from the burger stack menu and Brave will automatically start the update process.

Update April 17: Following on from my previous update that users of the Brave web browser were able to patch against the zero-day vulnerability discovered in the Chromium engine, there’s some more good news. I can confirm that Microsoft Edge users will also be protected once the latest security update for the browser has been downloaded and installed. Instructions for doing this are below.

Please don’t wait for an automatic update as this vulnerability allows a potential attacker to take control of your machine and an in-the-wild exploit already exists. By simply checking to see what version your Edge browser is, this process will kick-start a download if an update is ready.

It’s good to see that Microsoft has responded so quickly to this vulnerability. That said, my copy of the Brave browser still beat Microsoft to the vulnerability patching punch. I checked both Brave and Edge for updates simultaneously, and Edge was yet to have any update rolled out and available to me at that time. This could be a benefit of scale, with Brave obviously being a much smaller operation that Microsoft and a much smaller userbase to consider. However, that they both employ the same Chromium engine to power the respective browsers, I don’t think it’s asking too much to expect important updates like this to come out together. Indeed, I’d be happiest if the updates were rolled out across all browsers at the same time rather than everyone being a step or two behind Google Chrome.

And don’t just take my word for how dangerous this situation is, or that of Google which not only discovered the problem but issued an emergency fix, take heed of the U.S. Government as well. The Cybersecurity and Infrastructure Security Agency (CISA) has also confirmed that the vulnerability “has been detected in exploits in the wild” and encourages users and administrators to apply the necessary updates. While this does not carry quite the same weight as an official CISA alert or, indeed, an emergency directive that requires patching within federal outfits within a set time period, it does still clearly indicate this is not just your run of the mill security patch.

How to ensure Microsoft Edge has the latest security update

1. From the ‘three dot’ menu top right, select ‘Help and feedback|About Microsoft Edge’

2. This will immediately check if an update is available and start downloading if that is the case.

3. Once the download is complete you will need to restart the browser to ensure proper the installation is completed and that you are properly protected.

Google Suddenly Issues New Emergency Update For 3.2 Billion Chrome Users

More From Forbes

Canada Moves To Force Tech Firms To Share Revenues With News Publishers“,”scope”:{“topStory”:{“index”:1,”title”:”Canada Moves To Force Tech Firms To Share Revenues With News Publishers”,”image”:”https://specials-images.forbesimg.com/imageserve/624d5f9706e59f3a9dcb8b21/960×0.jpg”,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Apr 6, 2022″,”hourMinute”:”05:40″,”amPm”:”am”,”isEDT”:true},”uri”:”https://www.forbes.com/sites/emmawoollacott/2022/04/06/canada-moves-to-force-tech-firms-to-share-revenues-with-news-publishers/”}},”id”:”17dlapj67d0e00″},{“textContent”:”

Government Insider Helped Prison Inmates Steal Covid-19 Jobless Benefits, Investigators Say“,”scope”:{“topStory”:{“index”:2,”title”:”Government Insider Helped Prison Inmates Steal Covid-19 Jobless Benefits, Investigators Say”,”image”:”https://specials-images.forbesimg.com/imageserve/624c007744e2f8cc9b538b07/960×0.jpg”,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Apr 5, 2022″,”hourMinute”:”06:00″,”amPm”:”am”,”isEDT”:true},”uri”:”https://www.forbes.com/sites/thomasbrewster/2022/04/05/government-insider-helped-prison-inmates-steal-covid-19-unemployment-benefits-investigators-claim/”}},”id”:”39lm43a48j6800″},{“textContent”:”

Nigerian Cybercrime Law Ruled Illegal Over Human Rights Concerns“,”scope”:{“topStory”:{“index”:3,”title”:”Nigerian Cybercrime Law Ruled Illegal Over Human Rights Concerns”,”image”:”https://specials-images.forbesimg.com/imageserve/624b0d9f925b9f90ef94b9e5/960×0.jpg”,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Apr 4, 2022″,”hourMinute”:”11:26″,”amPm”:”am”,”isEDT”:true},”uri”:”https://www.forbes.com/sites/emmawoollacott/2022/04/04/nigerian-cybercrime-law-ruled-illegal-over-human-rights-concerns/”}},”id”:”3963f49d2do400″},{“textContent”:”

Australian Football Uses Machine Learning To Block Abusive Social Media Posts“,”scope”:{“topStory”:{“index”:4,”title”:”Australian Football Uses Machine Learning To Block Abusive Social Media Posts”,”image”:”https://specials-images.forbesimg.com/imageserve/624ac2971a063eb15f547a08/960×0.jpg”,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Apr 4, 2022″,”hourMinute”:”06:06″,”amPm”:”am”,”isEDT”:true},”uri”:”https://www.forbes.com/sites/emmawoollacott/2022/04/04/australian-football-uses-machine-learning-to-block-abusive-social-media-posts/”}},”id”:”82k6o29jomq800″},{“textContent”:”

Why This ‘Nightmare’ New Update Will Change Your WhatsApp Forever“,”scope”:{“topStory”:{“index”:5,”title”:”Why This ‘Nightmare’ New Update Will Change Your WhatsApp Forever”,”image”:”https://specials-images.forbesimg.com/imageserve/5f59d8280c615cc5ba6e4a7a/960×0.jpg?cropX1=1172&cropX2=6929&cropY1=999&cropY2=4173″,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Apr 2, 2022″,”hourMinute”:”07:15″,”amPm”:”am”,”isEDT”:true},”uri”:”https://www.forbes.com/sites/zakdoffman/2022/04/02/warning-for-apple-iphone-and-google-android-users-over-whatsapp-encryption-update/”}},”id”:”dejfcqla9m0000″},{“textContent”:”

Apple Users—Here’s Why You Should Always Manually Update Your iPhone“,”scope”:{“topStory”:{“index”:6,”title”:”Apple Users—Here’s Why You Should Always Manually Update Your iPhone”,”image”:”https://specials-images.forbesimg.com/imageserve/5f8ab5c07bdfce7eac675e02/960×0.jpg?cropX1=0&cropX2=4426&cropY1=255&cropY2=2744″,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Apr 2, 2022″,”hourMinute”:”06:30″,”amPm”:”am”,”isEDT”:true},”uri”:”https://www.forbes.com/sites/kateoflahertyuk/2022/04/02/new-iphone-tip-why-you-should-always-manually-update-your-iphone/”}},”id”:”c7pj276k745400″},{“textContent”:”

iOS 15.4.1—Update Now Warning Issued To All iPhone Users“,”scope”:{“topStory”:{“index”:7,”title”:”iOS 15.4.1—Update Now Warning Issued To All iPhone Users”,”image”:”https://specials-images.forbesimg.com/imageserve/5fa660188186bdd57f477241/960×0.jpg?cropX1=0&cropX2=3500&cropY1=208&cropY2=2178″,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Apr 1, 2022″,”hourMinute”:”04:25″,”amPm”:”am”,”isEDT”:true},”uri”:”https://www.forbes.com/sites/kateoflahertyuk/2022/04/01/ios-1541-update-now-warning-issued-to-all-iphone-users/”}},”id”:”1op5o4qai9jq00″}],”breakpoints”:[{“breakpoint”:”@media all and (max-width: 767px)”,”config”:{“enabled”:false}},{“breakpoint”:”@media all and (max-width: 768px)”,”config”:{“inView”:2,”slidesToScroll”:1}},{“breakpoint”:”@media all and (min-width: 1681px)”,”config”:{“inView”:6}}]};

Urgent Windows 10, 11 And Server Update Warning Issued As Active Attacks Confirmed

More From Forbes

Clearview: Glasses With Facial Recognition Are Here—And The Air Force Is Buying“,”scope”:{“topStory”:{“index”:1,”title”:”Clearview: Glasses With Facial Recognition Are Here—And The Air Force Is Buying”,”image”:”https://specials-images.forbesimg.com/imageserve/61fbe16d5551f14b1679be48/960×0.jpg”,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Feb 3, 2022″,”hourMinute”:”09:11″,”amPm”:”am”,”isEDT”:false},”uri”:”https://www.forbes.com/sites/thomasbrewster/2022/02/03/clearview-ai-glasses-with-facial-recognition-are-here-and-the-air-force-is-using-them/”}},”id”:”6k68njj5g3l400″},{“textContent”:”

How Hackers Can Drain Your Bank Account With Apple And Samsung Tap-And-Pay Apps“,”scope”:{“topStory”:{“index”:2,”title”:”How Hackers Can Drain Your Bank Account With Apple And Samsung Tap-And-Pay Apps”,”image”:”https://specials-images.forbesimg.com/imageserve/61faa04374e93f01191fe0fa/960×0.jpg”,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Feb 2, 2022″,”hourMinute”:”10:21″,”amPm”:”am”,”isEDT”:false},”uri”:”https://www.forbes.com/sites/thomasbrewster/2022/02/02/hack-drains-bank-accounts-with-apple-and-samsung-tap-and-travel-apps/”}},”id”:”4i1np76327gg00″},{“textContent”:”

Billionaire Facebook Investor Peter Thiel Secretly Funded A ‘Cyber Warfare’ Startup That Hacked WhatsApp“,”scope”:{“topStory”:{“index”:3,”title”:”Billionaire Facebook Investor Peter Thiel Secretly Funded A ‘Cyber Warfare’ Startup That Hacked WhatsApp”,”image”:”https://specials-images.forbesimg.com/imageserve/61f91f7d99942446841fe0fa/960×0.jpg”,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Feb 1, 2022″,”hourMinute”:”09:46″,”amPm”:”am”,”isEDT”:false},”uri”:”https://www.forbes.com/sites/thomasbrewster/2022/02/01/billionaire-facebook-investor-peter-thiel-secretly-funded-a-cyber-warfare-startup-that-hacked-whatsapp/”}},”id”:”bf1irnb3d0ao00″},{“textContent”:”

Hackers Spoof Post Office Notices To Spread Notorious Trickbot Malware“,”scope”:{“topStory”:{“index”:4,”title”:”Hackers Spoof Post Office Notices To Spread Notorious Trickbot Malware”,”image”:”https://specials-images.forbesimg.com/imageserve/61f846b7d740d1282345ff92/960×0.jpg”,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Jan 31, 2022″,”hourMinute”:”03:37″,”amPm”:”pm”,”isEDT”:false},”uri”:”https://www.forbes.com/sites/leemathews/2022/01/31/hackers-spoof-post-office-notices-to-spread-notorious-trickbot-malware/”}},”id”:”dob163nn5gd800″},{“textContent”:”

Fraud Prevention Systems: Underlying Principles And Top Challenges“,”scope”:{“topStory”:{“index”:5,”title”:”Fraud Prevention Systems: Underlying Principles And Top Challenges”,”image”:”https://specials-images.forbesimg.com/imageserve/61f78bd4abbf9e55600b752d/960×0.jpg”,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Jan 31, 2022″,”hourMinute”:”02:24″,”amPm”:”am”,”isEDT”:false},”uri”:”https://www.forbes.com/sites/davidbalaban/2022/01/31/fraud-prevention-systems-underlying-principles-and-top-challenges/”}},”id”:”mmdn05f9rne80″},{“textContent”:”

Apple Suddenly Drops Popular New iOS 15 iPhone Security Feature“,”scope”:{“topStory”:{“index”:6,”title”:”Apple Suddenly Drops Popular New iOS 15 iPhone Security Feature”,”image”:”https://specials-images.forbesimg.com/imageserve/5fa660188186bdd57f477241/960×0.jpg?cropX1=0&cropX2=3500&cropY1=208&cropY2=2178″,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Jan 29, 2022″,”hourMinute”:”06:30″,”amPm”:”am”,”isEDT”:false},”uri”:”https://www.forbes.com/sites/kateoflahertyuk/2022/01/29/apple-suddenly-drops-popular-new-ios-15-iphone-security-feature/”}},”id”:”9eql4kmqh11400″},{“textContent”:”

Storage Vendor QNAP Forces Update After Ransomware Hits 3600 Devices“,”scope”:{“topStory”:{“index”:7,”title”:”Storage Vendor QNAP Forces Update After Ransomware Hits 3600 Devices”,”image”:”https://specials-images.forbesimg.com/imageserve/61f4192acebeef652b7440ba/960×0.jpg”,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Jan 28, 2022″,”hourMinute”:”11:40″,”amPm”:”am”,”isEDT”:false},”uri”:”https://www.forbes.com/sites/leemathews/2022/01/28/storage-vendor-qnap-forces-update-after-ransomware-hits-3600-devices/”}},”id”:”cjb053h9fm5800″},{“textContent”:”

Apple’s Next iPhone Will Lack This Crucial Feature“,”scope”:{“topStory”:{“index”:8,”title”:”Apple’s Next iPhone Will Lack This Crucial Feature”,”image”:”https://specials-images.forbesimg.com/imageserve/61f415548e3d0134da0b752f/960×0.jpg”,”isHappeningNowArticle”:false,”date”:{“monthDayYear”:”Jan 28, 2022″,”hourMinute”:”11:17″,”amPm”:”am”,”isEDT”:false},”uri”:”https://www.forbes.com/sites/kateoflahertyuk/2022/01/28/apples-next-iphone-will-lack-this-crucial-feature/”}},”id”:”drj0800m9np400″}],”breakpoints”:[{“breakpoint”:”@media all and (max-width: 767px)”,”config”:{“enabled”:false}},{“breakpoint”:”@media all and (max-width: 768px)”,”config”:{“inView”:2,”slidesToScroll”:1}},{“breakpoint”:”@media all and (min-width: 1681px)”,”config”:{“inView”:6}}]};