{"id":19499,"date":"2022-07-02T10:45:07","date_gmt":"2022-07-02T18:45:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/07\/02\/news-13232\/"},"modified":"2022-07-02T10:45:07","modified_gmt":"2022-07-02T18:45:07","slug":"news-13232","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/07\/02\/news-13232\/","title":{"rendered":"Gun Database Breach Leaks Details on Thousands of Owners"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62bf749051f58063018c35bd\/master\/pass\/California-Gun-Owner-Leak-Security-Roundup-Security-GettyImages-185059996.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Sat, 02 Jul 2022 13:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/matt-burgess\">Matt Burgess<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">Your car is<\/span> a data <a data-offer-url=\"https:\/\/www.thedrive.com\/news\/think-your-smartphone-is-tracking-you-your-cars-doing-it-too\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.thedrive.com\/news\/think-your-smartphone-is-tracking-you-your-cars-doing-it-too&quot;}\" href=\"https:\/\/www.thedrive.com\/news\/think-your-smartphone-is-tracking-you-your-cars-doing-it-too\" rel=\"nofollow noopener\" target=\"_blank\">gold mine<\/a>. Each trip you make produces a lot of data\u2014from your location to your use of infotainment systems\u2014and car manufacturers are getting better at using this information. One 2019 analysis found cars could generate up to 25 gigabytes of data per hour. As companies refine their ability to mine this data, your car could prove to be the next <a href=\"https:\/\/www.wired.com\/china-cars-surveillance-national-security\">national security threat<\/a>. This week, the Chinese town of Beidaihe banned Teslas from its streets as the country\u2019s Communist party leaders gather in the area. One possible reason for the ban is that the cars could reveal <a href=\"https:\/\/www.wired.com\/china-cars-surveillance-national-security\">sensitive details about China\u2019s most senior figures<\/a>.<\/p>\n<p class=\"paywall\">Elsewhere, German mobile providers are testing \u201cdigital tokens\u201d as a way to serve up personalized advertising on people\u2019s phones. The trial of TrustPid by Vodafone and Deutsche Telekom generates pseudo-anonymous tokens based on people\u2019s IP addresses and uses them to show <a href=\"https:\/\/www.wired.com\/story\/trustpid-digital-token-supercookie\/\">personalized product recommendations<\/a>. The move has been likened to \u201c<a data-offer-url=\"https:\/\/www.accessnow.org\/cms\/assets\/uploads\/archive\/AIBT-Report.pdf\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.accessnow.org\/cms\/assets\/uploads\/archive\/AIBT-Report.pdf&quot;}\" href=\"https:\/\/www.accessnow.org\/cms\/assets\/uploads\/archive\/AIBT-Report.pdf\" rel=\"nofollow noopener\" target=\"_blank\">supercookies<\/a>,\u201d which have previously been used to track people without their permission. While Vodafone denies the system is akin to supercookies, privacy advocates say it is a step too far. \u201cCompanies that operate communication networks should neither track their customers nor should they help others to track them,\u201d privacy researcher Wolfie Christl <a href=\"https:\/\/www.wired.com\/story\/trustpid-digital-token-supercookie\/\">told WIRED<\/a>.<\/p>\n<p class=\"paywall\">In other stories this week, we\u2019ve rounded up the critical <a href=\"https:\/\/www.wired.com\/story\/you-need-to-update-windows-and-chrome-right-now\/\">updates from Android, Chrome, Microsoft, and others that emerged in June<\/a>\u2014you should make those updates now. We also looked at how the new <a href=\"https:\/\/www.wired.com\/story\/zuorat-trojan-malware-hacking-routers\/\">ZuoRAT router malware<\/a> has infected at least 80 targets worldwide. And we detailed <a href=\"https:\/\/www.wired.com\/story\/how-to-use-microsoft-defender\/\">how to use Microsoft Defender<\/a> on all your Apple, Android, and Windows devices.<\/p>\n<p class=\"paywall\">But that\u2019s not all. We have a rundown of the week\u2019s big security news that we haven\u2019t been able to cover ourselves. Click on the headlines to read the full stories. And stay safe out there.<\/p>\n<p class=\"paywall\">California\u2019s gun database, dubbed the Firearms Dashboard Portal, was meant to <a data-offer-url=\"https:\/\/oag.ca.gov\/news\/press-releases\/attorney-general-bonta-releases-new-firearms-data-increase-transparency-and\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/oag.ca.gov\/news\/press-releases\/attorney-general-bonta-releases-new-firearms-data-increase-transparency-and&quot;}\" href=\"https:\/\/oag.ca.gov\/news\/press-releases\/attorney-general-bonta-releases-new-firearms-data-increase-transparency-and\" rel=\"nofollow noopener\" target=\"_blank\">improve transparency<\/a> around the sale of weapons. Instead, when new data was added to it on June 27, the update proved to be a <a data-offer-url=\"https:\/\/www.nbcnews.com\/news\/us-news\/california-doj-data-breach-exposes-personal-information-concealed-carr-rcna35849\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nbcnews.com\/news\/us-news\/california-doj-data-breach-exposes-personal-information-concealed-carr-rcna35849&quot;}\" href=\"https:\/\/www.nbcnews.com\/news\/us-news\/california-doj-data-breach-exposes-personal-information-concealed-carr-rcna35849\" rel=\"nofollow noopener\" target=\"_blank\">calamity<\/a>. During the planned publication of new information, the California Department of Justice made a spreadsheet publicly accessible online and exposed more than 10 years of gun owner information. Included in the data breach were the names, dates of birth, genders, races, driver\u2019s license numbers, addresses, and criminal histories of people who were granted or denied permits for concealed and carry weapons between 2011 and 2021. More than 40,000 CCW permits were <a data-offer-url=\"https:\/\/www.theguardian.com\/us-news\/2022\/jun\/30\/california-gun-owners-data-breach\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.theguardian.com\/us-news\/2022\/jun\/30\/california-gun-owners-data-breach&quot;}\" href=\"https:\/\/www.theguardian.com\/us-news\/2022\/jun\/30\/california-gun-owners-data-breach\" rel=\"nofollow noopener\" target=\"_blank\">issued in 2021<\/a>; however, California\u2019s justice department said financial information and Social Security numbers weren\u2019t included in the data breach.<\/p>\n<p class=\"paywall\">While the spreadsheet was online for under 24 hours, an initial investigation appears to indicate that the breach was more widespread than initially thought. In a press release <a data-offer-url=\"https:\/\/oag.ca.gov\/news\/press-releases\/california-department-justice-alerts-individuals-impacted-exposure-personal\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/oag.ca.gov\/news\/press-releases\/california-department-justice-alerts-individuals-impacted-exposure-personal&quot;}\" href=\"https:\/\/oag.ca.gov\/news\/press-releases\/california-department-justice-alerts-individuals-impacted-exposure-personal\" rel=\"nofollow noopener\" target=\"_blank\">issued on June 29<\/a>, the Californian DOJ said other parts of its gun databases were also \u201cimpacted.\u201d Information contained in the Assault Weapon Registry, Handguns Certified for Sale, Dealer Record of Sale, Firearm Safety Certificate, and Gun Violence Restraining Order dashboards may have been exposed in the breach, the department said, adding that it is investigating what information could have been revealed. Responding to the data breach, the Fresno County Sheriff\u2019s Office <a data-offer-url=\"https:\/\/www.facebook.com\/FresnoSheriff\/posts\/pfbid02W7aUrY7MaMKjx3uQs91TYropkRrNamxSq9SoEo7tXt2AVTx4sYQ4KkrcdruJ5vrxl\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.facebook.com\/FresnoSheriff\/posts\/pfbid02W7aUrY7MaMKjx3uQs91TYropkRrNamxSq9SoEo7tXt2AVTx4sYQ4KkrcdruJ5vrxl&quot;}\" href=\"https:\/\/www.facebook.com\/FresnoSheriff\/posts\/pfbid02W7aUrY7MaMKjx3uQs91TYropkRrNamxSq9SoEo7tXt2AVTx4sYQ4KkrcdruJ5vrxl\" rel=\"nofollow noopener\" target=\"_blank\">said<\/a> it was \u201cworse than previously expected\u201d and that some of the potentially impacted information \u201ccame as a surprise to us.\u201d<\/p>\n<p class=\"paywall\">Indian hacker-for-hire groups have been targeting lawyers and their clients across the globe for the better part of a decade, a <a data-offer-url=\"https:\/\/www.reuters.com\/investigates\/special-report\/usa-hackers-litigation\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.reuters.com\/investigates\/special-report\/usa-hackers-litigation\/&quot;}\" href=\"https:\/\/www.reuters.com\/investigates\/special-report\/usa-hackers-litigation\/\" rel=\"nofollow noopener\" target=\"_blank\">Reuters investigation revealed this week<\/a>. Hacking groups have used phishing attacks to gain access to confidential legal documents in more than 35 cases since 2013 and targeted at least 75 US and European companies, according to the report, which is partly based on a trove of 80,000 emails sent by Indian hackers over the past seven years. The investigation details how hack-for-hire groups operate and how private investigators take advantage of their ruthless nature. As Reuters published its investigation, Google\u2019s Threat Analysis Group <a data-offer-url=\"https:\/\/blog.google\/threat-analysis-group\/countering-hack-for-hire-groups\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.google\/threat-analysis-group\/countering-hack-for-hire-groups\/&quot;}\" href=\"https:\/\/blog.google\/threat-analysis-group\/countering-hack-for-hire-groups\/\" rel=\"nofollow noopener\" target=\"_blank\">made public<\/a> dozens of domains belonging to alleged hack-for-hire groups in India, Russia, and the United Arab Emirates.<\/p>\n<p class=\"paywall\">Since 2009, the Chinese hacking group APT40 has targeted companies, government bodies, and universities around the world. APT40 has hit countries including the United States, United Kingdom, Germany, Cambodia, Malaysia, Norway, and more, according to security firm <a data-offer-url=\"https:\/\/www.mandiant.com\/resources\/apt40-examining-a-china-nexus-espionage-actor\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.mandiant.com\/resources\/apt40-examining-a-china-nexus-espionage-actor&quot;}\" href=\"https:\/\/www.mandiant.com\/resources\/apt40-examining-a-china-nexus-espionage-actor\" rel=\"nofollow noopener\" target=\"_blank\">Mandiant<\/a>. This week, a <a data-offer-url=\"https:\/\/www.ft.com\/content\/2e4359e4-c0ca-4428-bc7e-456bf3060f45\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.ft.com\/content\/2e4359e4-c0ca-4428-bc7e-456bf3060f45&quot;}\" href=\"https:\/\/www.ft.com\/content\/2e4359e4-c0ca-4428-bc7e-456bf3060f45\" rel=\"nofollow noopener\" target=\"_blank\"><em>Financial Times<\/em> investigation<\/a> found that Chinese university students have been tricked into working for a front company linked to APT40 and been involved in researching its hacking targets. The newspaper identified 140 potential translators who had applied to job ads at Hainan Xiandun, a company allegedly linked to APT40 and <a data-offer-url=\"https:\/\/www.justice.gov\/opa\/pr\/four-chinese-nationals-working-ministry-state-security-charged-global-computer-intrusion\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.justice.gov\/opa\/pr\/four-chinese-nationals-working-ministry-state-security-charged-global-computer-intrusion&quot;}\" href=\"https:\/\/www.justice.gov\/opa\/pr\/four-chinese-nationals-working-ministry-state-security-charged-global-computer-intrusion\" rel=\"nofollow noopener\" target=\"_blank\">named<\/a> in a US Department of Justice indictment in July 2021. Those applying for jobs at Hainan Xiandun were asked to translate sensitive US government documents and appear to have been \u201cunwittingly drawn into a life of espionage,\u201d according to the <a data-offer-url=\"https:\/\/www.ft.com\/content\/2e4359e4-c0ca-4428-bc7e-456bf3060f45\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.ft.com\/content\/2e4359e4-c0ca-4428-bc7e-456bf3060f45&quot;}\" href=\"https:\/\/www.ft.com\/content\/2e4359e4-c0ca-4428-bc7e-456bf3060f45\" rel=\"nofollow noopener\" target=\"_blank\">story<\/a>.<\/p>\n<p class=\"paywall\">In 2021, North Korean hackers <a href=\"https:\/\/www.wired.com\/story\/north-korea-cryptocurrency-theft-ethereum\/\">stole around $400 million in crypto<\/a> as part of the country\u2019s efforts to evade international sanctions and <a href=\"https:\/\/www.wired.co.uk\/article\/north-korea-hackers-apt38-cryptocurrency\">bolster its nuclear weapons program<\/a>. This week, investigators started linking the theft of around $100 million in cryptocurrency from Horizon Bridge, on June 23, to North Korean actors. Blockchain analysis firm Elliptic <a data-offer-url=\"https:\/\/hub.elliptic.co\/analysis\/the-100-million-horizon-hack-following-the-trail-through-tornado-cash-to-north-korea\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/hub.elliptic.co\/analysis\/the-100-million-horizon-hack-following-the-trail-through-tornado-cash-to-north-korea\/&quot;}\" href=\"https:\/\/hub.elliptic.co\/analysis\/the-100-million-horizon-hack-following-the-trail-through-tornado-cash-to-north-korea\/\" rel=\"nofollow noopener\" target=\"_blank\">says<\/a> it has uncovered \u201cstrong indications\u201d that North Korea\u2019s Lazarus Group may be linked to the Horizon Bridge hacking incident\u2014and Ellipictic is not the only group to <a data-offer-url=\"https:\/\/www.theguardian.com\/world\/2022\/jun\/30\/north-korean-hackers-thought-to-be-behind-100m-cryptocurrency-heist\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.theguardian.com\/world\/2022\/jun\/30\/north-korean-hackers-thought-to-be-behind-100m-cryptocurrency-heist&quot;}\" href=\"https:\/\/www.theguardian.com\/world\/2022\/jun\/30\/north-korean-hackers-thought-to-be-behind-100m-cryptocurrency-heist\" rel=\"nofollow noopener\" target=\"_blank\">have made the connection<\/a>. The attack is the latest in a string against <a href=\"https:\/\/www.wired.com\/story\/blockchain-network-bridge-hacks\/\">blockchain bridges<\/a>, which have become increasingly common targets in recent years. However, investigators say the ongoing crypto crash has <a data-offer-url=\"https:\/\/www.reuters.com\/technology\/crypto-crash-threatens-north-koreas-stolen-funds-it-ramps-up-weapons-tests-2022-06-28\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.reuters.com\/technology\/crypto-crash-threatens-north-koreas-stolen-funds-it-ramps-up-weapons-tests-2022-06-28\/&quot;}\" href=\"https:\/\/www.reuters.com\/technology\/crypto-crash-threatens-north-koreas-stolen-funds-it-ramps-up-weapons-tests-2022-06-28\/\" rel=\"nofollow noopener\" target=\"_blank\">wiped millions in value<\/a> from North Korea\u2019s crypto heists.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/california-gun-owner-leak-security-roundup\/\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62bf749051f58063018c35bd\/master\/pass\/California-Gun-Owner-Leak-Security-Roundup-Security-GettyImages-185059996.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Sat, 02 Jul 2022 13:00:00 +0000<\/strong><\/p>\n<p>Plus: Indian hacker-for-hire groups, Chinese student espionage efforts, and more.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-19499","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19499"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19499\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19499"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}