BlogNews2ND NOV 2023
AuthorSamir Yawar
5 min read
News

Toronto Public Library Outage, New MacOS Malware and Flipper Zero Bluetooth Spam dominate headlines

Twitter
Facebook
WhatsApp
Email
LinkedIn
A feature image for a blog post about the Toronto Public Library outage, KandyKorn MacOS Malware, Flipper Zero Bluetooth spam attacks.
BlogNews2ND NOV 2023
5 min read
News

Toronto Public Library Outage, New MacOS Malware and Flipper Zero Bluetooth Spam dominate headlines

AuthorSamir Yawar
Twitter
Facebook
WhatsApp
Email
LinkedIn
A feature image for a blog post about the Toronto Public Library outage, KandyKorn MacOS Malware, Flipper Zero Bluetooth spam attacks.

Cybersecurity threats continue to grow in sophistication and execution. This week, we experienced the Toronto Public Library outage, a new MacOS malware, and a spate of spam attacks caused by Bluetooth notifications.

Cybersecurity News Roundup


Here’s what went down this week:

Bluetooth spam attacks can now be launched with an Android app

A portable wireless pen-testing and hacking tool Flipper Zero can cause Bluetooth devices to become locked, even unresponsive with notification spam.

The popular testing tool can now launch Bluetooth spam attacks with an Android app. Earlier, it affected Apple iOS and Windows devices.

Flipper Zero works by spoofing advertising packets (ADV) via Bluetooth Low Energy (BLE) technology. Any BLE-enabled device will recognize these signals as legitimate connection requests. Once the device accepts this request, it is flooded with notifications that can render it unusable.

With the new Android app, Flipper Zero can cause Denial of Service (DoS) attacks that can impact a wide range of devices that search for Bluetooth radio signals.

This type of spam attack can confuse the target, make it difficult to discern between legitimate and spoofed devices, and even disrupt the user experience with non-stop notifications popping up on the targeted device.

How to stop Bluetooth spam attacks?

It should be noted that Android 14 and Windows 11 devices display notifications on Bluetooth connection requests by default. You will need to block these notifications on both systems.

The process to do so is easy:

If you use Android, navigate to Settings → Google → Nearby Share, and turn the toggle on Show notification to the "Off" position.

Another way to access the same menu is through Settings → Connected Devices → Connection preferences → Nearby Share.

If you use Windows, open Settings, select 'Bluetooth & devices' from the menu on the left, then click on 'Devices,' scroll down to 'Device settings,' and turn the 'Show notifications to connect using Swift Pair' toggle to the 'Off' position.

Toronto Public Library attacked by ransomware

It has now been confirmed that a ransomware group knocked Canada’s largest public library system offline earlier this week.

A few days ago, the Toronto Public Library alerted its users of being hit by a cyber attack. During the attack, users were unable to access the tpl.ca site and their online account. The outages also affected the tpl:map passes and digital collections services.

TPL has about 100 branches and 12 million books. It boasts about 1,200,000 registered members and operates on a budget of $200 million.

Authorities say that they’ve found no evidence of personal information being breached so far. They continue to investigate the compromised attack with cybersecurity experts.

According to BleepingComputer, the Black Basta ransomware operation was behind the attack.

MacOS gets a new malware that targets cryptocurrency

Apple computers are at risk from stealthy backdoor malware that can do data retrieval, upload/download files, and execute commands in the background without their consent.

Dubbed as KandyKorn, this new malware has been attributed to North Korea-based Lazarus hacking group. It targets engineers of a cryptocurrency platform.

This malware was linked to the Lazarus group by cybersecurity firm Elastic Security, who analyzed past campaigns and reviewed the techniques involved in this attack.

The attack begins on Discord, where the victim is deceived into downloading a malicious ZIP archive ‘cross-platform Bridges.zip.’  The target is told that they are downloading a legitimate bot that can help them generate profits automatically from cryptocurrency transactions.

In reality, the archive contains a Python script that establishes a connection with a rogue server and installs malicious software on the user’s machine. The attacker gets access to data from the victim’s machine as a result.

Samir Yawar
Samir Yawar / Content Lead
Samir wants a world where people can instinctively whack online scams and feel accomplished without the need for psychic powers. As an ISC2 member, he is doing his bit to turn cybersecurity awareness training into a fun concept with simple, approachable and accessible content. Reach out to him at X @yawarsamir
FAQsFrequently Asked Questions
One of the few malware signatures that targets Apple's macOS machines, the KandyKorn malware relies on a social engineering attack that installs a malicious payload on a victim's device.