SCIENCE
Hackers Demand Ransom for 1 Billion Stolen Customer Records!
Published
3 weeks agoon
By
OBS
The hackers behind devastating cyber attacks on Marks & Spencer and Jaguar earlier this year claim to have stolen 1 billion customer records from 39 major companies.
The group, who go by the name Scattered Lapsus$ Hunters – an alliance of Scattered Spider, Lapsus$ and ShinyHunters – has given a deadline of 10 October for a ransom to be paid, or else the data will be released.
Companies impacted, according to the cyber criminals, include Disney, FedEx, Google, Ikea, Mcdonald’s, Toyota and Qantas Airways.
Data was taken from systems hosted by Salesforce, with the hackers claiming that the software giant acted with “criminal negligence” by failing to block the intrusions.
Salesforce claims that its platform has not been compromised, blaming the breaches on social engineering attacks on individual companies using its platform rather than technical vulnerabilities.
“We are aware of recent extortion attempts by threat actors, which we have investigated in partnership with external experts and authorities,” a spokesperson for the company told The Independent.
“Our findings indicate these attempts relate to past or unsubstantiated incidents, and we remain engaged with affected customers to provide support. At this time, there is no indication that the Salesforce platform has been compromised, nor is this activity related to any known vulnerability in our technology.”
Social engineering attacks involve tricking individuals within a company or organisation to reveal confidential information like login access to computing systems.
They can involve phone calls or emails purporting to be from IT support, who manipulate the target into divulging sensitive information.
The hacking group shared what it claimed to be samples of the stolen data on its Telegram page, having gathered it during a months-long social engineering campaign against the firms.
Google, which was one of the victims, explained the methodology of the attack in a detailed blog post in August.
“Over the past several months, [the hacking group] demonstrated repeated success in breaching networks by having its operators impersonate IT support personnel in convincing telephone-based social engineering engagements,” the post stated.
“This approach has proven particularly effective in tricking employees, often within English-speaking branches of multinational corporations, into actions that grant the attackers access or lead to the sharing of sensitive credentials, ultimately facilitating the theft of organization’s Salesforce data.”
The Scattered Spider hackers rose to prominence after a string of high-profile attacks on telecom companies in 2022, before turning their focus on other industries spanning finance, gaming, hospitality and retail.
It is estimated that they have caused hundreds of millions of pounds worth of damage to victims, which include M&S and Co-op in the UK.
A profile compiled by the cyber security consultancy firm S-RM described them as “a set of predominantly native English-speaking cybercriminals – some as young as 16 – who have emerged from in a set of underground hacking groups”.
The report, shared with The Independent, also noted that the group can “convince helpdesk staff to quickly reset employee accounts,” while also breaching networks by purchasing account access information from initial access brokers on the dark web.
You may like
-
Study Reveals Mounjaro and Ozempic Demand Causing NHS Waiting List Delays!
-
AI Apps Hit 1 Billion Users: ChatGPT Surpasses X! Discover the Trend!
-
Shocking $28 Billion Bailout for DisCos: How Free Meters Could Transform Your Electricity Bill!
-
How Chinese Gangs Raked in Over $1 Billion by Bombarding Americans with Spam Texts!
-
Urgent Call: Why the FG Must Monetize Oil and Gas Reserves NOW Before Demand Skyrockets!
-
2026 Oil Demand Surge: OPEC Predicts Gasoline-Driven Boom You Can’t Afford to Miss!
SCIENCE
Thousands of Civil Servant Passwords Exposed: Experts Warn of Major Security Threat!
Published
2 weeks agoon
October 16, 2025By
OBS
More than 3,000 passwords belonging to civil servants have been exposed online since the beginning of 2024, according to new research, as experts warn it could pose a “serious risk” to national security.
A report by NordPass, using the threat exposure management platform NordStellar, found 3,014 passwords belonging to British civil servants have been leaked in the deep web – which encompasses parts of the internet that are not typically indexed by search engines– and the dark web, a small, encrypted part of the deep web that requires specific software to access and is often associated with cybercrime.
Four local authorities were named in the report as having passwords exposed online: Aberdeen City Council had 538 in total, while Lancashire County Council had 38, Newham Council had 73 and Southwark Council had 42 leaked on the dark and deep web.
It comes after The Independent revealed that hundreds of passwords and email addresses linked to UK government institutions were posted on the dark web in the last year, highlighting a major threat to UK cyber and national security. Among the most affected government departments are the Ministry of Justice with 195 exposed passwords, the Ministry of Defence (111), and Department of Work and Pensions (122).
A cyber security expert warned that the exposed sensitive data of civil servants was particularly dangerous as it could pose serious risks to the UK’s strategic interests.
Karolis Arbačiauskas, head of product at NordPass, said: “Exposure of sensitive data, including passwords, of civil servants is particularly dangerous. Compromised passwords can affect not only organisations and their employees but also large numbers of citizens. Moreover, such incidents may also pose serious risks to a country’s strategic interests.”
The report added that while the “vast majority of passwords exposed were those of employees working in regional level institutions,” the number of leaked passwords did not necessarily reflect the strength of an organisation’s internal security.
“These figures are often influenced by external factors,” said Mr Arbačiauskas. “Larger organisations, with more employees, naturally have a bigger digital footprint, which statistically increases the likelihood of credentials being exposed in a breach. In many cases, a single malware infection on an employee’s personal device or the compromise of a popular third-party website can expose dozens of accounts. Furthermore, the majority of leaks originate from external sites where employees registered using their work email addresses.”
He encouraged the practice of setting up an organisation-wide password policy, never reusing passwords, and using multi-factor authentication.
“If these passwords were not changed after their appearance on the dark web and multi-factor authentication (MFA) is not enabled, attackers could potentially access the email accounts and other sensitive information of these civil servants,” he said. “Moreover, we found hundreds of thousands of email addresses with other exposed data like names, last names, phone numbers, autofills, and cookies. This data can be exploited for phishing attacks and pose significant risks.”
It comes as the National Cyber Security Centre (NCSC) said on Tuesday that a “significant threat” posed by Chinese and Russian hackers had contributed to a record number of serious online attacks. A number of UK businesses, such as M&S, Jaguar Land Rover and Co-op have been hit by cyber attacks this year, crippling their operations and costing the firms billions.
In the year to the end of August, NCSC provided support in 429 cases, of which 204 were deemed “nationally significant incidents” – an increase from 89 in the previous 12 months. Of those, 18 were categorised as “highly significant”, meaning they had a serious impact on government, essential services, the economy or a large proportion of the UK population.
A spokesperson for Newham Council said: “It is an unfortunate reality that organisations like Newham Council will always be a target for criminals. Newham Council takes cybersecurity extremely seriously and have a number of robust measures in place to reduce risk. We regularly provide training and guidance to our staff making them aware of the risks and effective technical controls to reduce specific cyber risks. We do not comment on specific details of our cyber security controls and policies.”
An Aberdeen City Council spokesperson said: “Aberdeen City Council regularly reviews lists of compromised credentials via the National Cyber Security Centre and other official sources. These email/ password combinations are typically used to sign up on external sites or services rather than being compromised from the council’s tenant. Regardless of this all impacted account holders are contacted, and their passwords are reset as a matter of course.”
The Independent has approached Lancashire County Council, and Southwark Council for comment.
SCIENCE
AI Robotics Company Secures Funding Boost Thanks to Scottish National Investment Bank!
Published
2 weeks agoon
October 15, 2025By
OBS
An AI robotics company has raised more than £8 million, including funding from the Scottish National Investment Bank, to develop innovative technology.
Launchpad announced it has successfully concluded a Series A funding round, raising a total of 11 million US dollars, the equivalent of £8.2 million.
Launchpad is combining AI and advanced robotics to support critical automation strategies.
Its aim is for its technology to help companies build products faster, smarter, and more affordably.
The round was co-led by Lavrock Ventures and Squadra Ventures with participation from financial investors including the Scottish National Investment Bank, Ericsson Ventures, Lockheed Martin Ventures and Cox Exponential.
This is in addition to the 2.5 million dollars in grant funding previously awarded to Launchpad by Scottish Enterprise.
Last year, it opened a new research and development (R&D) centre in Edinburgh, choosing the city for its access to a skilled workforce and connections to university AI research and expertise.
Adrian Gillespie, chief executive of Scottish Enterprise, said: “With its R&D centre in Edinburgh, Launchpad is able to draw on Scotland’s long-standing academic, technical and entrepreneurial strengths.
“The company has quickly become an influential part of the Scottish innovation community, and we look forward to supporting its next growth phase.”
Anthony Kelly, investment director at the Scottish National Investment Bank, said: “Launchpad is fast becoming a leader in robotics, with its new R&D centre reinforcing Scotland’s reputation for innovation.
“We’re backing a high-calibre team whose cost-efficient solution shows strong potential to scale across multiple industries.”
SCIENCE
Discover How the New Apple Watch Measures Your Heart Rate with Amazing Accuracy!
Published
2 weeks agoon
October 15, 2025By
OBS
When the latest Apple Watch models were unveiled last month, the announcement of longer battery life, a bigger display and satellite connectivity for Apple Watch Ultra 3 were eye-catching. But it was a new health feature that was the real draw: notifications for hypertension, that is, high blood pressure.
Apple has placed health and the heart at the forefront for its Watch for years, with ECG readings and blood oxygen measurements among recent highlights.
Sumbul Desai, Apple’s vice president of health, spoke to The Independent soon after the announcement to explain the new feature and the thinking behind it.
“We’ve been wanting to work on hypertension for many years, to be candid. Hypertension affects more than a billion people worldwide, but less than half those cases are diagnosed. We wanted to raise awareness and to give people more power to avoid some complications that can happen down the line,” says Dr Desai.
But how to measure it? Conventional methods, where a clinician straps a cuff to your arm may not be the best.
“Often, when I used to see people in the clinic, they would come in,” Dr Desai explains, “and they’d be really nervous, so their blood pressure would be elevated, or they just ran from parking their car and, again, it’s elevated. But does that truly reflect what their blood pressure is as they live their everyday life?”
The new feature is not like heart rate, where you can initiate a reading instantly. Here, the feature works in the background by measuring blood pressure over a 30-day period. “We wanted to get a sense of your blood pressure as you’re just living your life,” Desai says.
At the end of that period, if it’s spotted what it thinks are high blood pressure readings, the Watch will notify you and encourage you to log your blood pressure.
Other wearables can measure your blood pressure, such as the Hilo band and Samsung smartwatches. They usually require calibration with a traditional cuff, but that’s not necessary here — again, Apple wants a simple process.
“We think about health as being holistic at Apple, and one of the keys to managing hypertension is exercise. I always say, if I could prescribe anything, it would be movement, because that’s key to so many conditions,” she adds.
While the heart rate monitoring on Apple Watch shows you beats per minute, there are no figures revealed for hypertension. Why is that?
“It was a few things, such as keeping it more simple and friendly. The way our algorithm works is that we did compare it to ground truth with a cuff, but we did it over a period of 30 days. Your blood pressure, one minute, can be higher, then you sit down, and it’s lower,” Desai explains. “So, we decided to not fixate on a number: because of so many variations we were having a lot of outliers. And so it was better to do an aggregate over 30-day periods. The way the algorithm works is it looks at a signal that is indicative of hypertension, but isn’t necessarily measuring the actual number but it correlates with the blood pressure number. We are not measuring systolic and diastolic directly in the traditional sense.
“What we’re measuring is how the blood is flowing and what the response of the blood flow is, to the beats of the heart, and that correlates with blood pressure, which is why we didn’t put an exact number in, for one reason. We wanted to start with how do we get the true sense of what your blood pressure is as you’re living your life without a fixation on the number? And so that was the reason we decided to approach it more from this vantage point given the technology we have.”
Though no number is shown, the algorithm knows what the range is. It compares your individual readings over 30 days and then resets. “We had people take their blood pressure at various points during the day, and that’s how we correlated the signal. We’re looking at the trace pattern of the signal, that correlated with elevated blood pressure,” Dr Desai says.
She also explains that the sensitivity of the analysis is on the low side – Desai says it will detect four out of ten cases – compared to specificity which is very high, about 92 per cent.
“The reason we did that is, for those that get a notification, we wanted to feel confident that they will have a positive result. We didn’t want to create a situation where, if the number was lower, say, we had false positives, and we wanted to make sure there was confidence in the algorithm when someone is using it. So, we made the trade-off of not being able to capture everyone, because if you look at the numbers of hypertension, it’s still significantly a large number. But those that actually get a notification, we feel very confidently it will yield a stage one or stage two diagnosis. If you get notified, you’re more than likely to have a condition.”
The 30-day system means it’ll assess your data for 30 days and if it sees nothing it will reset and start checking again over the next 30 days. “If you do receive a notification, it’s not that the process stops, we still keep checking in the background. I think it has a potential of shortening kind of the time frame that people get diagnosed with hypertension,” Dr Desai hopes.
The assessments take place multiple times a day, though not when you’re on a vigorous run, for instance, because your heart rate would naturally be elevated. There’s no set number of readings, but there’s a minimum across the 30 days for Apple to be confident in the data. Each reading takes just seconds.
The feature has a future, Desai thinks: “We do the appropriate validation testing to get the regulatory approval, because the regulators have to feel like we’re not providing anybody with inaccurate information. But I think this area is ripe to understand more. This is very novel system in the way it does it, and we think we will learn that there may be other signals that this may be also indicative of, but we started with hypertension. And I think that’s what’s so remarkable.”
Categories
Top Tags
Related posts
