{"id":30018,"date":"2025-03-27T08:16:28","date_gmt":"2025-03-27T12:16:28","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=30018"},"modified":"2025-03-27T08:16:28","modified_gmt":"2025-03-27T12:16:28","slug":"fbi-warns-iphone-and-android-users-about-chinese-attack-how-to-tell-if-your-online-accounts-have-been-hacked-googles-zero-day-flaw-fixed-make-sure-chromes-updated-and-more","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/fbi-warns-iphone-and-android-users-about-chinese-attack-how-to-tell-if-your-online-accounts-have-been-hacked-googles-zero-day-flaw-fixed-make-sure-chromes-updated-and-more\/","title":{"rendered":"FBI Warns iPhone and Android Users about Chinese Attack; How to Tell If Your Online Accounts Have Been Hacked; Google&#8217;s Zero Day Flaw Fixed &#8211; Make Sure Chrome&#8217;s Updated&#8230; and more!"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 24pt;\"><strong>FBI Warns iPhone and Android Users about Chinese Attack; How to Tell If Your Online Accounts Have Been Hacked; Google&#8217;s Zero Day Flaw Fixed &#8211; Make Sure Chrome&#8217;s Updated<\/strong><\/span><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">&#8230; and more!<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Every day, we scan the tech world for interesting news, sometimes from outside the tech world. Every Thursday, we feature news articles that grabbed our attention over the past week. We hope you find this week&#8217;s &#8216;Thursday Newsbytes&#8217; informative and interesting!<\/span><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/03\/23\/iphone-android-users-bombarded-by-chinese-attack-do-not-ignore-fbi-warning\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 24pt;\">FBI Warning As iPhone, Android Users \u2018Bombarded\u2019 By Chinese Attack<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Stop sending texts, the FBI told Americans in December, as Chinese hackers marauded through U.S. networks. But there\u2019s another text threat that\u2019s now rapidly sweeping across America \u201cfrom state to state,&#8221; and this one is more likely to get you, stealing your money, maybe even your identity. And it\u2019s also made in China.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">\u201cHave you received a text suggesting you may owe unpaid tolls on your vehicle?\u201d the bureau warned again this week. \u201cThere is a good chance it\u2019s a fraudster trying to get your personal information.\u201d We\u2019re talking the smishing texts now targeting iPhone and Android phones across America with fake toll bills. The FBI tells users to delete these texts immediately, and there are lots of them.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">In a new report, the Anti-Phishing Working Group (APWG) paints a bleak picture. \u201cResidents of the U.S. are being bombarded with text messages from Chinese phishers, purporting to come from U.S. toll road operators&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/03\/23\/iphone-android-users-bombarded-by-chinese-attack-do-not-ignore-fbi-warning\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"text-decoration: underline;\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><span style=\"font-size: 18pt;\">Read more at Forbes.<\/span><\/span><\/span><\/strong><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/techcrunch.com\/2025\/03\/25\/how-to-tell-if-your-online-accounts-have-been-hacked\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">How to tell if your online accounts have been hacked<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">More and more hackers are targeting regular people with the goal of breaking into their bank accounts, stealing their crypto, or simply stalking them. These types of attacks are still relatively rare, so there\u2019s no need for alarm. But it\u2019s important to know what you can do to protect yourself if you suspect someone accessed your email, social media account, chat apps, or any other major service and platform.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">A few years ago, I wrote a guide to help people protect themselves, and understand that most of the companies you have an account with already offer you tools to take control of your accounts\u2019 security, even before you contact them for help, which in some cases you still should do.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Here we break down what you can do on several different online services, including Gmail (and more broadly a Google account), Facebook, Apple ID, and more. And come back often because this is a regularly updated resource, both in terms of making sure the instructions for each individual service or platform are up to date, as well as to add new ones&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/techcrunch.com\/2025\/03\/25\/how-to-tell-if-your-online-accounts-have-been-hacked\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong><span style=\"text-decoration: underline;\"><span style=\"font-size: 18pt;\"><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><span style=\"font-size: 18pt;\">Read More at TeleCrunch.<\/span><\/span><\/span><\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.techradar.com\/pro\/security\/google-chrome-security-flaw-could-have-let-hackers-spy-on-all-your-online-habits\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Google Chrome security flaw could have let hackers spy on all your online habits<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Google fixed its first Chrome zero-day of 2025<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Google has fixed a high-severity zero-day vulnerability in its Chrome browser that was being exploited in the wild.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">In a security advisory, the company described the bug as an \u201cincorrect handle provided in unspecified circumstances in Mojo on Windows\u201d.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The flaw is tracked as CVE-2\u201925-2783, and it\u2019s yet to be given a severity score. Google just lists it as \u201chigh\u201d in its advisory. It was fixed with version 134.0.6998.178 that already rolled out, so make sure to double-check if you\u2019ve already received it&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.techradar.com\/pro\/security\/google-chrome-security-flaw-could-have-let-hackers-spy-on-all-your-online-habits\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Read more at TechRadar Pro.<\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.pcmag.com\/news\/creator-of-haveibeenpwned-data-breach-site-falls-for-phishing-email\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Creator of HaveIBeenPwned Data Breach Site Falls for Phishing Email<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">However, the hacker behind the phishing attack appears to have only stolen the email addresses of those who subscribed to Troy Hunt&#8217;s blog, rather than Haveibeenpwned.com.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">A hacker has managed to phish Troy Hunt, the creator of HaveIBeenPwned.com, tricking the security expert into clicking a malicious email while he was jetlagged.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The breach affects people who subscribed to Hunt\u2019s personal blog, rather than HaveIBeenPwned, a data breach notification site that\u2019s attracted millions of users. \u201cI&#8217;m enormously frustrated with myself for having fallen for this, and I apologize to anyone on that list,\u201d he said&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.pcmag.com\/news\/creator-of-haveibeenpwned-data-breach-site-falls-for-phishing-email\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Read more at PCMag<\/span><\/strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\"><strong>.<\/strong><\/span><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.techradar.com\/pro\/the-growing-threat-of-device-code-phishing-and-how-to-defend-against-it\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 24pt;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">The growing threat of device code phishing and how to defend against It<\/span><\/strong><\/span><\/a><\/p>\n<p><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">How to protect against device-code phishing<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Just as we think we\u2019re getting one step ahead of cybercriminals, they find a new way to evade our defenses.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The latest method causing trouble for security teams is that of device code phishing, a technique that tricks users into granting access to sensitive accounts without attackers needing to steal a password.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Microsoft recently issued a warning about a particular device code phishing campaign being conducted by Storm-2372, where a supposed Russian-backed threat actor was wreaking havoc by hijacking user sessions through legitimate authentication flows. These attacks are trickier to detect than usual given that they exploit real login pages (rather than the spoofed versions that traditional phishing techniques relied on) and are capable of bypassing multi-factor authentication (MFA).<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The recent warning from Microsoft will most likely be the first of many&#8230;<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.techradar.com\/pro\/the-growing-threat-of-device-code-phishing-and-how-to-defend-against-it\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\"><strong><span style=\"text-decoration: underline;\">Read more at TechRadarPro.<\/span><\/strong><\/span><\/a><\/p>\n<hr \/>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt; color: #ff0000;\"><strong><em><span style=\"color: #0000ff;\">Thanks for reading this week&#8217;s Thursday Newbytes. We hope these articles were informative, interesting, fun, and helpful.<\/span> <\/em><\/strong><\/span><\/p>\n<hr \/>\n<p><a href=\"https:\/\/thundercloud.net\/donation.htm\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/thundercloud.net\/infoave\/images\/2017\/goodfight2017.png\" alt=\"Help us help you!\" width=\"573\" height=\"136\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; FBI Warns iPhone and Android Users about Chinese Attack; How to Tell If Your Online Accounts Have Been Hacked; Google&#8217;s Zero Day Flaw Fixed &#8211; Make Sure Chrome&#8217;s Updated&#8230; and more! Every day, we scan the tech world for interesting news, sometimes from outside the tech world. Every Thursday, we feature news articles that grabbed our attention\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/fbi-warns-iphone-and-android-users-about-chinese-attack-how-to-tell-if-your-online-accounts-have-been-hacked-googles-zero-day-flaw-fixed-make-sure-chromes-updated-and-more\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":29224,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[101,1673,4496,2247,4430,1678,1426,3590,1680,1656,4202,4522],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/30018"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=30018"}],"version-history":[{"count":3,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/30018\/revisions"}],"predecessor-version":[{"id":30021,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/30018\/revisions\/30021"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/29224"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=30018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=30018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=30018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}