It was a big year for cybersecurity in 2022 with massive cyberattacks and data breaches, innovative phishing attacks, privacy issues and, of course, zero-day vulnerabilities.
Some stories, however, were more popular with our readers than others.
Below are the ten most popular stories on BleepingComputer in 2022, with a summary of each.
Russia has created its own TLS certificate authority (CA) to allow websites to continue providing HTTPS connections after sanctions prevented them from renewing certificates from Western companies.
Since CAs must first be trusted by companies before being used in their browsers, Russian-based Yandex Browser and Atom Products were the only companies to recognize the new CA at the time.
For this reason, Russia has asked citizens to use these browsers instead of Chrome, Firefox, Edge, etc.
Four malicious Android apps were available on Google Play that stole sensitive information from victims’ devices and generated “pay-per-click” revenue for operators.
The malware mimicked Bluetooth apps that only displayed malicious functionality 72 hours after installation. This delay allowed apps to evade detection by security software and Google’s review process.
The developer of the very popular npm package named “node-ipc” has released sabotaged versions of the library that delete all data and overwrite all files on the developer’s machines, in addition to creating new text files with “peace “.
A new social engineering attack has enabled a method that could be used to abuse Microsoft Teams for phishing attacks and secretly execute commands to steal data using GIFs.
This method abused various flaws to exfiltrate data directly through Microsoft’s own servers, making it look like legitimate Microsoft Team traffic.
It should be noted that the attacker must first convince a user to install a malicious stager that runs commands and uploads the output to a Microsoft Teams webhook.
Over thirty malicious Google Chrome extensions with a combined million installs on the Chrome Web Store have been used to inject affiliate links into websites and hijack searches.
The extensions themselves did not contain any malicious code, which made them difficult to detect.
A Linux vulnerability named PwnKit has been found in the pkexec component of Polkit which attackers could exploit to gain full root privileges on the system.
This vulnerability was tracked because CVE-2021-4034 was present in the default configuration of all major Linux distributions, making it a significant concern for administrators and security professionals.
Security researchers have discovered that the desktop app for Microsoft Teams saves authentication tokens in clear text in various places in Windows.
These authentication tokens could be stolen by hackers who accessed the device to log in as a user, even if they had multi-factor authentication (MFA) enabled.
Microsoft and many security researchers didn’t think this was a problem on its own, as it requires a user to have previously gained access to a system before they can steal the tokens, which already means that their “game is over” for the user because the threat actor could access all locally stored data.
However, other researchers found this report very concerning due to the rising tide of information thieves who could steal the tokens and send them back to remote attackers.
BleepingComputer was the first to report that threat actors gained access to Okta’s GitHub repositories and stole the company’s source code.
Okta began alerting customers last month via a “confidential” email shared with BleepingComputer, warning that Okta Workforce Identity Cloud (WIC) source code was exposed in the breach.
However, they said the hackers did not access the source code of Auth0 (Customer Identity Cloud) products during the breach.
The developer of the popular “colors” and “faker” open source libraries intentionally introduced an infinite loop that has bricked thousands of projects that depend on the packages.
Applications using these libraries suddenly found their projects displaying gibberish messages on their console stating “LIBERTY LIBERTY LIBERTY” followed by a sequence of non-ASCII characters:
This change appears to have been introduced in retaliation against mega-corporations and commercial consumers of open-source projects that rely heavily on freeware and community-powered software but which, according to the developer, do not give back to the community.
This year’s most-read story tells how a security researcher accidentally discovered a way to bypass the lock screen on his fully patched Google Pixel 6 and Pixel 5 Android smartphones.
This vulnerability is identified as CVE-2022-20465 and has been addressed in Android security updates released on November 7, 2022.
A demonstration of this workaround is shown in the view below.