The Daily Decrypt
DuckDuckGo Dives Deep, Appdome's Geo Judo, and Bumblebee's Buzzback - Cyber Security News
Loading
/

From DuckDuckGo’s innovative approach to secure synchronization of user data across devices, to Appdome’s cutting-edge Geo Compliance suite aimed at combating location spoofing, and the alarming resurgence of the Bumblebee malware loader in a new phishing campaign, we explore the implications of these advancements and threats. Join us as we unpack the significance of end-to-end encryption, the fight against location-based fraud, and the continuous battle against sophisticated cyber threats. Discover how these developments impact our digital lives and what measures can be taken to enhance security in the digital realm.

  • DuckDuckGo’s Privacy Innovation: Learn about DuckDuckGo’s end-to-end encrypted Sync & Backup feature, providing users with a secure way to synchronize their data across devices without compromising privacy. Read more.
  • Appdome’s Battle Against Location Spoofing: Dive into Appdome’s Geo Compliance suite, offering mobile brands a robust solution to verify user locations and detect fraudulent activities to uphold the integrity of mobile commerce. Read more.
  • The Return of Bumblebee: Uncover the details of Bumblebee’s comeback in a sophisticated phishing campaign, posing significant threats to organizational security and how these developments signal a broader wave of cyber threats. Read more.

Stay informed about the latest in cybersecurity and digital privacy with our in-depth analysis and discussions on the most pressing issues facing the digital world today.

Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/


Transcript:
[

00:00:00] Good morning listeners today is February 15th, 2024. And you’re listening to the daily decrypt. I’ve got a quick episode for you today. We’re just going to touch on a three stories. One duck, duck go has some new updates, which we’re pretty excited about.

A company called app dome is re-inventing geo compliance for mobile security.

And for the nerdier folk, the bumblebee is back. This is a new wave of cyber threats. So let’s dive right in.

[00:01:00] All right. So our first article comes from bleeping computer and it discusses duck. Duck goes introduction. Of an end to end encrypted sync and backup feature for their privacy centric browser.

Dr. Goh has been a beacon for those seeking to protect their online activities from prying eyes. And it’s known for its search engine that promises not to track users.

Its latest update, introduces a sync and backup feature, which allows users to securely synchronize bookmarks passwords and email protection settings without the need for an account. Or by revealing any sensitive information to duck, duck go.

We love this. This is a huge step towards separating your identity from what you do on the internet.

So what sets this feature apart is its use of end-to-end encryption. And for those of you who aren’t super savvy in the tech field, this means that. The data is encrypted in such a way that only the user can access it. Not even duck duck go can peek into the transferred information.

This [00:02:00] ensures that personal data like passwords and bookmarks remain private and secure. Which is a significant step forward in preserving user privacy online. Duck duck go employs local encryption to store sensitive data on the user’s device. And during synchronization between devices, this data remains encrypted.

And because the decryption key is stored locally on your devices, your information is inaccessible to anyone, but you.

Little caveat to that is. Your information is inaccessible to anyone, but you or anyone who has access to your devices. Make sure your devices are password protected. And go to sleep or lock after a reasonable amount of time. One minute might be too quick. Five minutes might be too quick, but. Get in the habit of locking your devices when you walk away from them.

Another feature of this is the easy setup. Users can sync their data by scanning a QR code or entering a text code, bridging their digital life across windows, Mac iOS, iOS, and Android devices seamlessly. duck Duck go provides recovery codes in a PDF document, ensuring that [00:03:00] users can retrieve their data, even if their device is lost or stolen. We don’t love QR codes overall, but if it’s being provided by duck, duck, go. You should be pretty safe. Attackers will also have this information, so they might try to generate fake QR codes or fake PDFs, but I’ve never really seen syncing across devices without creating an account.

So I’m pretty excited to give this a try if you’re also excited to give this a try. The duck duck go browser is available for download on various platforms.

Though the browser is still in beta. It’s still very accessible. So go out there, give it a shot and let us know what you think on Twitter or Instagram. We’d love to hear from you.

So up next, we’re talking about a company. called app dome, which might be behind many of your apps already on your phone. They.

Provide security features for apps across Android and iOS.

This can mean security features such as end-to-end automation. [00:04:00] Mobile apps, security anti-fraud anti-malware anti-China antibody and geo compliance.

Their sites are focused on the geo compliance part of that. they’ve come up with a groundbreaking feature set, which is designed to help mobile brands, verify user locations and detect fraudulent activities such as location spoofing. Or fake GPS, app usage, VPNs, and SIM swaps.

These are common methods that are often employed to bypass geographical restrictions and mobile applications, which can pose a significant challenge to maintaining the integrity of mobile commerce and transaction data.

This is great, but. I have to point out the irony of discussing this right after talking about not being tracked online. By duck, duck go.

Geolocation is a tough thing to nail down. IP addresses are wildly inaccurate. And yeah, your location can be mapped using different apps. Like VPNs or. All kinds of other things. So this is huge for.

Government regulation of data, [00:05:00] privacy, but might be bad news for protecting yourself and your privacy online.

Tom Tovar, who is the CEO of abdom discusses? The struggle mobile brands face. In achieving true geo compliance. Traditional products in this space have suffered from a fragmented approach requiring complex software development, kit integrations, and a heavy lift from engineering teams. solution. A unified automated platform that integrates geo compliance with over 300 other mobile app defense features, streamlining the process and ensuring compatibility across the board.

this next piece is drawing attention to recent activities of the notorious malware loader and initial access broker known as bumblebee.

Bumblebee is back and its resurgence is marked by a sophisticated phishing campaign targeting us organizations with cleverly disguised. Voicemail themes, lures leading to malicious one drive URLs. So watch out for.

Suspicious looking voicemails. And if you do [00:06:00] happen to click on one. it opens one drive.

You know what to do. Proof point and enterprise security firm has traced these activities. Noting that the malicious URLs guide unsuspecting victims to a word document that impersonates the consumer electronics company humane.

That’s not very humane of them.

These documents named in a deceptive manner like release Evans, hashtag 96 dot doc.

Employ VBA macros to execute a chain of commands that eventually download and run the bumblebee loader. This development is particularly alarming considering Bumblebee’s reputation for downloading and executing ransomware among other malicious payloads. bumblebee was first identified in March of 2022 and has been a tool for various crime where actors replacing older loaders, such as Basel loader.

It’s development is suspected to be under the wings of the Conti and trick bot cyber crime syndicates showcasing a continuous evolution in cyber crime tactics. Interestingly the return of bumblebee coincides with the [00:07:00] reappearance of malware variants, like crackpot, Xeloda, and Pika bot. Which is highlighting a broader wave of cyber threats.

There’s a lot of vulnerabilities that involve Microsoft office macros.

So keep an eye out for. A office template you might download for free on the internet that when you open it, it prompts you to enable macros. It is going to try to convince you that you need to enable these macros to use this template. But I would advise against enabling macros since that pretty much gives. The word document.

The ability to launch other programs to run code, to do anything that malware would need to do.

Download a template. It asks you to enable macros, probably delete that template and look on a different site.

Microsoft has also taken steps to disable macros in an unsecure way, but there’s always ways around it.

The article we’re referencing also touches on a broader context with Malwarebytes uncovering phishing campaigns that mimic financial institutions. Tricking individuals into [00:08:00] downloading legitimate remote desktop software. Like any desk under false pretenses further enabling cyber criminals to exploit unsuspecting users.

All right.

So that’s all we got for today, Thank you so much for listening. Give us a tweet if you like, what you’ve heard. We’d love to hear from you on Instagram. We’re posting little highlight reels. And Yeah, your recommendation means a lot to us. So send this podcast to a friend.

If you thought it was fun or valuable or anything. Talk to you more tomorrow.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.