Message to CEO Stefan Thomas
Saying "we take privacy extremely seriously" is clearly a lie.
You didn't.
Micropayments company Coil has emailed users its new privacy policy but placed hundreds of their addresses in the “To:” field and therefore breached their privacy. The mail had the Subject line “Updates to Coil’s Terms and Privacy Policy” and offered links to the document. The Register has read it and can report that while it …
I run a small club and just use a mailing list provider (mail chimp) to get information out to each member. The software makes sure you can’t do this sort of mistake.
This needs the people responsible to take full liability along with the directors, so they understand how much of a problem they have caused.
Hint: Outlook and Exchange are the single least-configurable things you'll find for what you think should be simple features.
To: BCC: and CC:, signatures, email delivery delay/recall, greylisting, searching through all mailboxes and performing an action on an email, assigning permissions to a particular person to manage those email accounts, etc.
Everything you think "That should be easy", forget it. Or be prepared to faff in a web GUI for ages, or write some Powershell to get the job done. And, in many cases, pay through the nose on a per-user, per-month basis to some random third-party in order to do it in an anywhere-near vaguely-sensible fashion (e.g. Exclaimer for signatures)
From what I recall, SpamAssassin hates messages with multitudes BCC recipients and not a single user in the To: field.
If you are saying that if we put users in the To: field, we make individual messages to the users in the SPAM, err, Marketing client, then yes, I agree, they should do that. Give them the send as one message option with a big red blinking warning box that says, "Enable send as one message with multiple To: recipients at your own peril".
So to keep SpamAssassin happy, only have a BCC field and simply put the first address in the TO field.
Or better yet, break it into seven million individual messages, each to one recipient. Isn't that what the mail server is doing anyway? It just moves it one step nearer the user.
A County Council planning dept did the same to me and 40+ others, emailing an apparently random group with a change to planning policy. The culprit's response to having it flagged up was basically 'meh', until the analogy that it was akin to me standing in the middle of town handing our her mobile phone number to 40 passing strangers lodged in her head. A meaningless and too-late apology followed.
Another business that takes security so seriously that it trains its customers to be phished.
More like another company that takes security so seriously, it farms it out to unspecified third parties. Nothing like increasing the corporate attack surface as a security goal.
Colleagues keep asking me why their <external third party> mass-mailing emails can't come from our proper domain but come from <company name>@massmailing.<external third party>.tv or whatever.
"The same reason that we don't let them telephone our customers directly and claim to be us."
My favourite is when an adjacent department purchased a cloud mass mailing service without telling us and tried to send messages spoofing our primary domain. When they put a ticket in asking why it was going to people's spam folder, we only learned it was them that purchased the service after a day-long investigation, from someone outside of that department.
Cloud was a mistake, as it allows just about anyone to purchase things they should not have and set them up with little technical knowledge.
While working at a game developer that had signed up to make games for a much-anticipated console, I got an email from the console maker, "To:" a hundred or so people, all of whom had been sternly cautioned to not divulge that we would be producing content for their new console.
Not a lot of surprises as we verified who were our competition, but a bit of "Sauce for the Goose". We could have been terminated from the program for leaking that info, but them? Meh.
This happened at work the other day, 800 or so email addresses. A smattering of private domain name addresses (presumably personal services companies of employees / contractors who are using those addresses instead of proper work email addresses) and a load of third party contractors. Anyhoo I reported it to IT and was then told by our DPO that in reporting it and forwarding the email to IT support (at their request), I had in fact committed the data breach. The DPO is adamant that everybody on the list had given consent to share the data across the organisation and wider, so no breach had occurred with the original email.
This was the head honcho DPO and a multiple million turnover organisation
These kinds of 'mistakes' happen every single day and nobody bats an eyelid anymore.
I'll just get on with the day job and leave IT security to the professionals. They obviously know better than me
The choppy waters continue at OpenSea, whose security boss this week disclosed the NFT marketplace suffered an insider attack that could lead to hundreds of thousands of people fending off phishing attempts.
An employee of OpenSea's email delivery vendor Customer.io "misused" their access to download and share OpenSea users' and newsletter subscribers' email addresses "with an unauthorized external party," Head of Security Cory Hardman warned on Wednesday.
"If you have shared your email with OpenSea in the past, you should assume you were impacted," Hardman continued.
Carnival Cruise Lines will cough up more than $6 million to end two separate lawsuits filed by 46 states in the US after sensitive, personal information on customers and employees was accessed in a string of cyberattacks.
A couple of years ago, as the coronavirus pandemic was taking hold, the Miami-based biz revealed intruders had not only encrypted some of its data but also downloaded a collection of names and addresses; Social Security info, driver's license, and passport numbers; and health and payment information of thousands of people in almost every American state.
It all started to go wrong more than a year prior, as the cruise line became aware of suspicious activity in May 2019. This apparently wasn't disclosed until 10 months later, in March 2020.
Google has reportedly asked the US Federal Election Commission for its blessing to exempt political campaign solicitations from spam filtering.
The elections watchdog declined to confirm receiving the supposed Google filing, obtained by Axios, though a spokesperson said the FEC can be expected to publish an advisory opinion upon review if Google made such a submission.
Google did not immediately respond to a request for comment. If the web giant's alleged plan gets approved, political campaign emails that aren't deemed malicious or illegal will arrive in Gmail users' inboxes with a notice asking recipients to approve continued delivery.
Someone is trying to steal people's Microsoft 365 and Outlook credentials by sending them phishing emails disguised as voicemail notifications.
This email campaign was detected in May and is ongoing, according to researchers at Zscaler's ThreatLabz, and is similar to phishing messages sent a couple of years ago.
This latest wave is aimed at US entities in a broad array of sectors, including software security, security solution providers, the military, healthcare and pharmaceuticals, and the manufacturing and shipping supply chain, the researchers wrote this month.
UK automobile service and parts seller Halfords has shared the details of its customers a little too freely, according to the findings of a security researcher.
Like many, cyber security consultant Chris Hatton used Halfords to keep his car in tip-top condition, from tires through to the annual safety checks required for many UK cars.
In January, Hatton replaced a tire on his car using a service from Halfords. It's a simple enough process – pick a tire online, select a date, then wait. A helpful confirmation email arrived with a link for order tracking. A curious soul, Hatton looked at what was happening behind the scenes when clicking the link and "noticed some API calls that seemed ripe for an IDOR" [Insecure Direct Object Reference].
Open-source cross-platform email and messaging client Thunderbird has hit version 102, with a new look and improved functionality, including Matrix chat support.
The latest release is the first major upgrade since version 91, which The Reg looked at last August. This is normal for the app – it follows the same approximately annual release cycle as Firefox's Extended Support Releases, the most recent of which was also version 91. From now until the next major release, Thunderbird 102 will get a regular stream of minor updates and bug fixes.
102 has a modernized look and feel. There's a new "Spaces" toolbar, which appears vertically on the left of the app window and lets users quickly flip between inbox, address book, calendar, task list, and chat tabs. All of these are built-in features – the former Lightning calendar add-on is now an integral part of the app, as is PGP support, which used to be an add-on called Enigmail. Thunderbird can talk to various groupware calendar and contact servers, including both private and corporate Google Mail accounts, Microsoft Exchange and Office 365, and others.
The FTC is warning members of the LGBTQ+ community about online extortion via dating apps such as Grindr and Feeld.
According to the American watchdog, a common scam involves a fraudster posing as a potential romantic partner on one of the apps. The cybercriminal sends explicit of a stranger photos while posing as them, and asks for similar ones in return from the mark. If the victim sends photos, the extortionist demands a payment – usually in the form of gift cards – or threatens to share the photos on the chat to the victim's family members, friends, or employer.
Such sextortion scams have been going on for years in one form or another, even attempting to hit Reg hacks, and has led to suicides.
A threat actor has taken to a forum for news and discussion of data breaches with an offer to sell what they assert is a database containing records of over a billion Chinese civilians – allegedly stolen from the Shanghai Police.
Over the weekend, reports started to surface of a post to a forum at Breached.to. The post makes the following claim:
A California state website exposed the personal details of anyone who applied for concealed-carry weapons (CCW) permits between 2011 and 2021.
According to the California Department of Justice, the blunder happened earlier this week when the US state's Firearms Dashboard Portal was overhauled.
In addition to that portal, data was exposed on several other online dashboards provided the state, including: Assault Weapon Registry, Handguns Certified for Sale, Dealer Record of Sale, Firearm Safety Certificate, and Gun Violence Restraining Order dashboards.
If claims hold true, AMD has been targeted by the extortion group RansomHouse, which says it is sitting on a trove of data stolen from the processor designer following an alleged security breach earlier this year.
RansomHouse says it obtained the files from an intrusion into AMD's network on January 5, 2022, and that this isn't material from a previous leak of its intellectual property.
This relatively new crew also says it doesn't breach the security of systems itself, nor develop or use ransomware. Instead, it acts as a "mediator" between attackers and victims to ensure payment is made for purloined data.
Biting the hand that feeds IT © 1998–2022