Cops destroy the world’s largest video game cheat ring


This week the Justice Department indicted 22-year-old alter the water installation where he worked. It’s a stark reminder that while the power grid gets the most attention, it’s not the only piece of critical infrastructure vulnerable to potentially devastating attacks.

We also looked at YouTube’s lingering issues with moderation of child-focused content; a WIRED investigation found dozens of creepy miniatures on videos for Minecraft and the child-centered activities that were at or near the top of the “Themes” pages of the platform. It’s not as dire a situation as the so-called Elsagate controversy a few years ago, in which the YouTube Kids app was inundated with grotesque videos featuring popular children’s characters performing indescribable acts. But it still shows that YouTube still has a lot of moderation work ahead of it.

Tired of receive unwanted files from strangers, whether through AirDrop or whatever Android is calling its version these days? You can make them stop! And probably should. Just follow our guide to check and uncheck the various settings needed to stop over-sharing.

And there’s more! Each week, we collect all the news that WIRED hasn’t covered in depth. Click on the titles to read the full stories. And stay safe there.

An organization known as “Chicken Drumstick” reportedly made $ 76 million in revenue for its subscription video game cheat service before law enforcement separated them this week. The group had billed $ 10 per month for cheaters at games like Overwatch and Call of Duty Mobile. In addition to confiscating $ 46 million in assets – which did not include a small number of luxury cars – police said they destroyed 17 cheaters and arrested 10 people in the dismantling. Chinese tech titan Tencent, which owns stakes in several major game companies, worked with authorities on the deal.

A whistleblower told independent security reporter Brian Krebs that a recent breach by network equipment company Ubiquiti was much worse than originally reported. The source said the hackers “gained full read / write access to Ubiquiti databases at Amazon Web Services,” as well as root administrator access to Ubiquiti’s AWS accounts. These are essentially the keys to the kingdom. Ubiquiti responded that it had no indication that user data was accessed or stolen, although the Krebs source says the company does not keep logs that would give them this information in the first place. In short, it’s a mess!

In January, Google reported that North Korea’s Lazarus Group hackers had expended a considerable amount of power. attempt to fool security researchers, and had even had some success in doing so. This week, the search giant’s threat analysis group followed up, saying the North Korean campaign was continuing at a steady pace, this time armed with a fake website and fake social media profiles. . In a bit of inspiration from trolling, one of Twitter’s puppets was called Sebastian Lazarescue.

It’s safe to say that many, many people are feeling pandemic exhaustion these days. But consider the men and women of the United States Cybersecurity and Infrastructure Security Agency. After its highly respected leader Chris Krebs was sacked by presidential tweet last fall, CISA had to deal with the fallout from SolarWinds and Hafnium, of the largest hacking campaigns in the United States in recent history. Politico reports that the agency’s 2,000 workers are dangerously exhausted – which could leave the country ill-prepared for the next attack.

Last weekend, the US Strategic Command – they are the ones who oversee nuclear weapons – tweeted a small series of gibberish, causing some to naturally wonder if they had been hacked. The good news is, no, they weren’t. The less good news is that instead, the child of whoever was logged in to the account had a moment at the keyboard. Just the right mix of adorable and alarming!


More WIRED stories

Leave a Reply

Your email address will not be published. Required fields are marked *