Eshield business Risk Control Weekly reports security technologies and events worth attention every week, including but not limited to content security, mobile security, business security and network security, to help enterprises enhance vigilance and avoid these seemingly small but actually large security risks that affect the healthy development of business.

1. Android users beware, hackers are trying to infect devices using Fortnite

Fortnite, a full free-to-play game released in 2018, is undoubtedly one of the most popular games out there. It’s trickling down to Windows, iOS, PlayStation 4 and Xbox One, but Android has been slow to launch and is expected this summer.

The huge success of Fortnite games, which now have more than 125 million active users, has attracted cybercriminals who try to use its popularity to target fans and lure them into downloading tainted versions of the game that could compromise Android devices.

2. Guangdong destroyed the country’s first “call to death” black gray industry gang shut down 830,000 accounts

Recently, the Ministry of Public Security under the coordination of the provincial public security department, guangzhou, shenzhen and other 15 local public security organs in sichuan, henan, guangdong and other provinces synchronization to carry out the “safe net” 2 hit “call dead you” black ash industry chain project arrests, successful aborted “crazy cloud call” and “ou death” two “call dead you” criminal gangs, And offline use “call dead you” platform for illegal collection of a particular asset management co., LTD., a certain xin financial microfinance companies, by asset management co., LTD., and other three criminal gangs, captured the criminal suspect, led by its China, LeiMou, more than 210 people, captured criminals mobile phone more than 3100 sets, closure “call dead you” more than 830000 accounts, Servers, computers, bank cards and other items involved in the case were seized, which was the first case of the “Call to death” black gray industrial chain project destroyed by the whole chain.

3. Another $30 million in currency stolen from a South Korean cryptocurrency exchange

South Korean digital currency exchange Bithumb has suspended deposits after hackers stole more than $31.5 million worth of cryptocurrency, Yonhap news agency reported. The trading platform was hacked process and reasons, is still unknown.

Bithumb is not the first cryptocurrency exchange to be hacked recently. Just last week, Coinrail, a well-known cryptocurrency exchange in South Korea, was also hacked and lost $40 million.

4. Hackers used ZeroFont to bypass Office 365 anti-phishing mechanisms

According to Israeli cloud security company Avanan, some cyber criminals are using ZeroFont (ZeroFont) technology to bypass most of the artificial intelligence phishing detection mechanisms implemented by widely used email services and Internet security scanners.

5.APP account cancellation becomes difficult, and many well-known apps are hit

Beijing News reporters recently tested whether 35 apps, including wechat, Weibo and Alipay, could cancel their accounts, and found that 21 apps, including Mobike and Ele. me, had no option to cancel their accounts. The cancellation of Apps such as Kuaishou and Huajiao Live requires users to provide a variety of certificates such as photos of hand-held ID cards; The user accounts of Pindoduo and QQ cannot be cancelled actively. Although the customer service of Ele. me promised to “cancel the operation within 5 days”, they only unbound their mobile phone numbers after 5 days, and the accounts that should be cancelled still exist.

6.Google Home and Chromecast may be giving away your location, but patches are coming

Google will release an update in the coming weeks to fix the vulnerability.

7. Symantec: US Satellite System Hacked!

Symantec said on Wednesday that its artificial intelligence-based security monitoring tool has found that hackers are targeting satellite communications, telecommunications, geospatial imaging services and military systems in the United States and Southeast Asian countries.

The group’s attacks fall under the category of cyber espionage, but reveal a strategy to disrupt the target’s operating system. As a result, the group could be judged to have engaged in more aggressive and disruptive activities against its targets, Symantec said.

8. Tesla sues former employees for hacking into internal production systems to steal and leak confidential data

Tesla sued Martin Tripp, a former process technician, on Wednesday, alleging that he stole the company’s trade secrets and leaked a large amount of its internal data to third parties, according to a lawsuit unsealed in federal court in Nevada.

Click to try netease Cloud Eshield security service for free.