- Gone Phishing
- Posts
- Google OAuth2 flaw is being actively abused in the wild
Google OAuth2 flaw is being actively abused in the wild

Welcome to Gone Phishing, your daily cybersecurity newsletter that will never break its resolution to keep you in the know when it comes to steering clear of cybercrime π¦Έπ¦Έπ¦Έ
Todayβs hottest cybersecurity news stories:
β οΈ Google OAuth2 flaw is being actively abused in the wild ποΈ
π Automakers on track to regulation due to privacy worries π
π N. Korea uses AppleSeed, Meterpreter, TinyNuke malware πΎ
Hackers: Now where do you think youβre Auth2? πππ
π Security Alert: Malware Threat Exploits Google Account Vulnerability! π
π¨ Researchers at cybersecurity firm CloudSEK have uncovered a critical threat targeting Google accounts. π¨ Multiple malware-as-a-service info stealers, including Lumma Stealer, now possess the ability to manipulate authentication tokens, providing hackers with persistent access even after users reset their passwords. π±
ποΈ This alarming capability was first identified in November, marking a significant evolution in information-stealing malware. Lumma Stealer, a leading culprit, employs an undocumented exploit in the OAuth 2.0 security protocol, commonly used for Google single sign-on.
π‘οΈ Despite Google's silence on the matter, the vulnerability has rapidly spread among various malware groups such as Rhadamanthys, RisePro, Meduza, Stealc Stealer, and Eternity Stealer. The exploit, initially disclosed by an attacker known as PRISMA, allows for "session persistence," maintaining unauthorised access even if passwords are changed.
π Protect Yourself: Regularly monitor your Google account activity, use multi-factor authentication, and stay updated on security best practices. Report any suspicious activities immediately!
π This exploit poses severe threats, granting hackers access to Google Drive, email login, and other OAuth-connected services. CloudSEK emphasises the exploit's potential impact on users and organisations, urging vigilance and proactive security measures.
Stay safe online! π‘οΈ

Learn AI in 5 minutes a day. We'll teach you how to save time and earn more with AI. Join 400,000+ free daily readers for trending tools, productivity boosting prompts, the latest news, and more.

Well they canβt a Ford not to, but letβs wait and see if itβs Fiat for purpose π¬ππ
Faye Francy, head of the Automotive Industry Sharing and Analysis Center, shares her unsettling experience with a used car's infotainment system. After syncing her phone for navigation, she ended up at the previous owner's home and discovered sensitive information. π±
What You Need to Know:
π Connected vehicles pose privacy risks, even if you don't sync your phone to the infotainment system.
π± Sensors and geolocation can reveal significant data, leading to potential privacy violations.
π Even erasing data may not be foolproof, as it's often sold to data brokers.
Regulatory Response:
π΅οΈββοΈ California's Privacy Protection Agency is investigating connected vehicle manufacturers for privacy practices.
π« Comprehensive federal privacy legislation is stalled, but the FTC may step in for real change.
FTC Action:
π FTC could draw parallels from a 2009 Sears settlement, holding automakers accountable for extreme data extraction practices.
π A potential 6(b) investigation may require major manufacturers to disclose their data practices.
Consumer Concerns:
π€ Many manufacturers hide data collection practices in lengthy privacy policies, leaving consumers unaware.
π Privacy advocates call for clear disclosures and action against excessive data extraction.
What's Next?
π Politicians, like Sen. Ed Markey, are demanding answers from auto manufacturers about their data practices.
π The spotlight on car data privacy is growing, with potential regulatory actions and increased consumer awareness.
π Protect Yourself: Be cautious about syncing personal devices in your car, regularly check privacy settings, and demand clear disclosures from manufacturers. Your car is an extension of your privacy! π‘οΈπ

π£ Catch of the Day!! πππ¦
π The Motley Fool: βFool me once, shame on β shame on you. Fool me β you can't get fooled again.β Good olβ George Dubya π Let us tell whoβs not fooling around though; thatβs the CrΓΌe π at Motley Fool. Youβd be a fool (alright, enough already! π) not to check out their Share Tips from time to time so your savings can one day emerge from their cocoon as a beautiful butterfly! π Kidding aside, if you check out their website theyβve actually got a ton of great content with a wide variety of different investment ideas to suit most budgets π€ (LINK)
π΅ Wander: Find your happy place. Cue Happy Gilmore flashback ποΈβ³πποΈ Mmmm Happy Placeβ¦ π So, weβve noticed a lot of you guys are interested in travel. As are we! We stumbled upon this cool company that offers a range of breath-taking spots around the United States and, honestly, the website alone is worth a gander. When all you see about the Land of the free and the home of the brave is news of rioting, looting and school shootings, itβs easy to forget how beautiful some parts of it are. The awe-inspiring locations along with the innovative architecture of the hotels sets Wander apart from your run of the mill American getaway ποΈπ (LINK)
π Digital Ocean: If you build it they will come. Nope, weβre not talking about a baseball field for ghosts βΎπ»πΏ (Great movie, to be fair π). This is the Digital Ocean whoβve got a really cool platform for building and hosting pretty much anything you can think of. If you check out their website youβll find yourself catching the buzz even if you canβt code (guilty π). But if you can and youβre looking for somewhere to test things out or launch something new or simply enhance what youβve got, weβd recommend checking out their services foβ sho π And how can you not love their slogan: Dream it. Build it. Grow it. Right on, brother! πΏ (LINK)

βRocket Manβ uses TinyNuke ππ₯π
π Cyber Alert: North Korean Hackers Strike Again! π¨
πΎ Cybersecurity firm AhnLab has identified spear-phishing attacks by North Korea-affiliated nation-state actors using a variety of backdoors and tools, including AppleSeed, Meterpreter, and TinyNuke.
π£ The Advanced Persistent Threat group, known as Kimsuky, has been active for over a decade, expanding its targets from South Korea to global entities.
π Key Findings:
π AppleSeed, a Windows-based backdoor, has been in use since May 2019 and now has an Android version and a Golang variant called AlphaSeed.
π AlphaSeed, developed in Golang, employs chromedp for communication with the command-and-control server.
π Kimsuky has been using AlphaSeed in attacks since October 2022, often deploying both AppleSeed and AlphaSeed on the same target system.
π» Other tools like Meterpreter, TightVNC, and TinyNuke are utilised to take control of compromised systems.
π Implications:
π North Korean IT workers are using fake personas on LinkedIn and GitHub to secure remote employment, acting as a revenue stream for the regime.
πΌ The personas claim expertise in various applications, crypto, and blockchain transactions.
π‘ Insights: π North Korea has been actively targeting blockchain and cryptocurrency firms, utilising diverse tactics to evade sanctions and profit illicitly.
π¨ Stay Vigilant:
π« Beware of spear-phishing attacks.
π Regularly update security measures.
π Monitor online platforms for suspicious activity.
Despite misconceptions, North Korea is a serious cyber player, employing advanced techniques to evade international sanctions and achieve its economic and security goals. π
Underestimate the Rocket Man at your own peril πππ

ποΈ Extra, Extra! Read all about it!
Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
The GeekAI: A daily 3 min newsletter on what matters in AI, with all the new AI things coming to market its good to stay ahead of the curve.
Libby Copa: The Rebel Newsletter helps writers strengthen their writing and creative practice, navigate the publishing world, and turn their art into an act of rebellion.
Techspresso: Receive a daily summary of the most important AI and Tech news, selected from 50+ media outlets (The Verge, Wired, Tech Crunch etc)
Let us know what you think!
So long and thanks for reading all the phish!
Give us a rating? |

