Reddit Logo

Clay Group

@h4cker.in · #security #alert

🚨 Is Reddit safe? **56.3 million user data leaked on the dark web!** 🚨
Cybersecurity experts warn about **compromised emails, passwords, and private messages.** Change your passwords and enable 2FA now! #RedditLeak #CyberSecurity

Reddit Data Leak

🚨 Reddit security report - data leak analysis

A recent **dark web data dump** has revealed **56.3 million Reddit accounts** compromised in a **major security breach**. Cybercriminals have leaked **emails, hashed passwords, private messages, and even browsing history**.

🔴 **What data was leaked?** - Usernames & Email Addresses - Hashed Passwords (potentially cracked) - Private Messages & Subreddit Activity - IP Addresses & Account Creation Details

🔴 **How did this happen?** - **Phishing attacks on Reddit employees** - **Weak password storage mechanisms** - **APIs exploited by attackers**

🔴 **What can you do?** ✅ **Change your Reddit password immediately** ✅ **Enable Two-Factor Authentication (2FA)** ✅ **Monitor your email for breach alerts** ✅ **Avoid clicking on suspicious links**

Cybersecurity experts recommend using **a password manager and enabling advanced security settings** to protect against future breaches.

Clay Hacker Group Post
Clay Hacker Group

Clay Group

@h4cker.in · #security

Apple’s Siri Privacy Settlement: A $95 Million Wake-Up Call on User Data Protection

Apple has long been known for its strong stance on privacy, often marketing itself as a company that values user security above all else. However, a recent $95 million settlement over alleged privacy violations by Siri, Apple’s voice assistant, has raised questions about how well the tech giant truly protects its users’ data.

The Allegations Against Apple

The lawsuit, originally filed in 2023, claimed that Siri was recording and storing user conversations without explicit consent. Plaintiffs alleged that Apple’s voice assistant occasionally activated by mistake, capturing private discussions that were later used for data analysis and improving Siri’s capabilities.

These recordings reportedly included sensitive personal and professional conversations, raising concerns about user privacy. According to the lawsuit, Apple misled users by suggesting that Siri only listened when the wake words—such as “Hey Siri”—were used. However, reports surfaced that Siri sometimes activated accidentally and sent recordings to Apple’s servers without proper user knowledge.

Apple’s Response and the Settlement

Apple has denied any wrongdoing but agreed to settle the case for $95 million to avoid prolonged litigation. The company maintains that it does not sell user data and that all Siri interactions are encrypted and anonymized to prevent misuse.

Despite this, the settlement indicates a recognition of flaws in Siri’s activation process and how data is handled. The settlement funds will be distributed among affected users, though the eligibility criteria have yet to be fully disclosed. The lawsuit primarily applies to users who interacted with Siri on Apple devices between 2019 and 2021.

Implications for User Privacy

This case highlights growing concerns about how tech companies handle voice data. Virtual assistants like Siri, Amazon Alexa, and Google Assistant rely on machine learning models that require massive amounts of user input to improve. However, this often leads to unintentional data collection, raising ethical and legal questions.

For Apple, this settlement serves as a reminder that even a company that champions privacy must continuously improve its security measures. Moving forward, users can expect Apple to introduce stricter controls on Siri activations, clearer transparency policies, and more robust privacy settings.

What Users Can Do to Protect Their Privacy

If you are concerned about how Siri handles your data, here are a few steps to safeguard your privacy:

Final Thoughts

Apple’s $95 million Siri privacy settlement is a wake-up call not just for Apple but for all tech companies relying on AI-driven voice assistants. As virtual assistants become more embedded in our daily lives, ensuring robust privacy protections is essential. While Apple has taken steps to address these concerns, users should remain proactive in managing their digital privacy.

Clay Hacker Group Post
Clay Hacker Group

Clay Group

@h4cker.in · 1h

The Biggest Crypto Hack of 2025: Bybit Loses $1.5 Billion

Introduction

The cryptocurrency world has witnessed one of the largest hacks in its history. In February 2025, Dubai-based exchange Bybit suffered a security breach, losing $1.5 billion in Ethereum.

How the Attack Happened

Hackers exploited a vulnerability during a routine transfer from Bybit's cold wallet to a warm wallet. They manipulated the transaction logic, transferring 401,000 Ethereum to an unknown address.

Who Is Behind the Attack?

Security experts suspect the Lazarus Group, a North Korean state-sponsored hacking group, known for previous high-profile crypto heists.

Bybit’s Response

Bybit CEO Ben Zhou assured users that all client funds remain backed 1:1. The company has launched an investigation and a 10% bounty program for ethical hackers to help recover the stolen assets.

Implications for the Crypto Industry

This attack highlights security vulnerabilities in centralized exchanges and the need for better regulations, security measures, and decentralized alternatives.

Can the Stolen Funds Be Recovered?

Blockchain forensic firms are tracking the stolen Ethereum, but hackers may use mixing services and DEXs to launder the funds.

Conclusion

The Bybit hack of 2025 serves as a reminder of the risks in crypto. Stronger security, decentralization, and oversight are essential to prevent future breaches.

Clay Hacker Group Post
Clay Hacker Group

Clay Group

@h4cker.in · 1h

Instagram Users Report Surge of Sensitive and Violent Content in Feeds

February 26, 2025 – What Happened?

On February 26, 2025, Instagram users worldwide experienced an unexpected influx of sensitive, violent, and explicit content in their feeds, particularly in Reels. Many users took to social media, including X (formerly Twitter), to express concerns about seeing graphic videos involving fights, illegal activities, and other disturbing material—despite having their Sensitive Content Control settings turned on.

Possible Causes

While Meta (Instagram's parent company) has not yet issued an official statement, several theories are circulating about why this may have happened:

User Reactions

Many Instagram users voiced frustration over the sudden appearance of inappropriate videos. Common complaints included:

One user on X tweeted:
"I opened Instagram, and my entire feed was filled with fight videos and graphic content. What is happening?"

Another user commented:
"Even with my content filter set to 'Less,' I'm getting disturbing Reels. Instagram needs to fix this ASAP."

What You Can Do

If you're experiencing this issue, here are some steps to regain control of your feed:

Meta's Response

As of now, Meta has not provided an official response or explanation for the issue. However, users are advised to stay updated through Instagram's official support channels and social media announcements.

Final Thoughts

This incident raises questions about Instagram’s ability to moderate content effectively. If this was a glitch, it highlights potential flaws in Meta’s AI-based content filtering system. If it was an exploit, Instagram may need to patch vulnerabilities in its algorithm to prevent misuse.

For now, users should be cautious and proactive in managing their feeds while waiting for an official fix from Instagram.

Clay Hacker Group Post
Clay Hacker Group

Clay Group

@h4cker.in · 1h

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware

Cybersecurity researchers have identified a new campaign by the Belarus-linked hacking group Ghostwriter. The attackers are using obfuscated Excel macros to distribute malware, making it harder for security solutions to detect the threats.

How the Attack Works

The attack involves multiple stages, leveraging malicious Excel files to deliver malware:

  • The hackers send phishing emails containing Excel attachments.
  • These Excel files include macros obfuscated using Macropack, a tool designed to bypass security detection.
  • When users enable macros, the hidden payload executes and installs malware on the victim’s system.
  • Purpose of the Attack

    The primary objectives of this malware campaign include:

  • Stealing sensitive information from compromised systems.
  • Gaining persistent access to government and corporate networks.
  • Executing espionage operations targeting NATO-aligned countries.
  • Why This Attack is Dangerous

    The use of Macropack makes the malicious macros more difficult to detect and analyze. Key threats include:

  • Bypassing traditional security tools that detect standard macro-based attacks.
  • Spreading malware rapidly through phishing campaigns.
  • Enabling long-term espionage by maintaining access to infected networks.
  • How to Protect Against This Threat

    Cybersecurity experts recommend the following protective measures:

  • Avoid enabling macros in Excel files from unknown sources.
  • Use endpoint detection and response (EDR) solutions to identify and block malicious macros.
  • Educate employees about phishing techniques and email security best practices.
  • As cyber threats continue to evolve, organizations must remain vigilant and implement robust security measures to defend against sophisticated attacks like those carried out by Ghostwriter.