By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Fake Apps, Fraudulent Emails, and Very Real Hackers: Another Week in the Infosec Trenches
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Fake Apps, Fraudulent Emails, and Very Real Hackers: Another Week in the Infosec Trenches
News

Fake Apps, Fraudulent Emails, and Very Real Hackers: Another Week in the Infosec Trenches

News Room
Last updated: 2026/03/15 at 9:35 PM
News Room Published 15 March 2026
Share
Fake Apps, Fraudulent Emails, and Very Real Hackers: Another Week in the Infosec Trenches
SHARE

This may sound like a very simple reminder, but if you ever get an email claiming to be from the customer support team of a service you use, always contact them directly to make sure the message you got is real. Similarly, when you sign up for a new app, download it from an official website or app store. Why, you ask? Let’s take a look at the security news this week, and you’ll understand. 

First of all, we reported this week that a fake Starlink app for Android turned out to be a bitcoin miner. So if you’re a Starlink user and find your Android phone has been getting pretty hot at night, you may want to make sure you have the official app from the Google Play Store, and not a knockoff. Then there’s the fake Claude Code install that turned out to be malware, targeting would-be vibe coders by gaming Google search results with sponsored placements for itself, ranking higher than the official installer and official download pages. Even worse, the fake Claude Code steals sensitive data like passwords, session cookies, and more, and is very difficult to delete. 

There’s also poor LastPass, which has had its share of issues, but this one’s not its fault: Fake customer service emails targeting LastPass users have been trying to steal vault access out of unsuspecting users. This is classic phishing, and we have tips to spot and avoid it, but they all involve keeping your eyes peeled. In the same vein, hackers have been targeting high-profile accounts on Signal and WhatsApp with similar phishing campaigns. 

In other still concerning news, a pro-Iran hacker group called Handala claims to have wiped over 200,000 devices at a US-based medical equipment provider called Stryker, and the company has confirmed the attack. The company is facing a global outage as a result of the attack, and among the devices wiped by the hackers are company servers and computers, but notably mobile devices, including employee-owned personal devices that the company required their staff to install corporate software on (presumably in order to get a hold of them for work-related issues). 

This is a good reminder to avoid installing corporate tools on your personal devices if possible (not just because it gives your employer access to your personal device, but also to avoid things like this), and if it’s not possible, check and see if your company can provide a device for that purpose. At the very least, make sure all your devices are protected with antivirus software or a security suite, and you keep your personal data backed up in case your device is lost, stolen, or wiped.

Let’s take a look at what else is going on in the infosec world this week.


AI vs. AI: McKinsey’s Chatbot Compromised in Two Hours

What happens when you put one AI against another AI? Everyone loses—except for the security researchers who conducted the experiment, who got a great story out of the whole thing. As The Register reports, researchers from security firm CodeWall put their agentic AI up against consulting company McKinsey’s own AI chatbot, and in less than two hours, the agent managed to break in, obtain full read/write access to the chatbot’s full production database, which included, “46.5 million chat messages about strategy, mergers and acquisitions, and client engagements, all in plaintext, along with 728,000 files containing confidential client data, 57,000 user accounts, and 95 system prompts controlling the AI’s behavior.”

Even worse, because it had full read and write access, the agent could exfiltrate, delete, and even poison all of that data. Now, CodeWall was doing this at McKinsey’s behest; this wasn’t an unsanctioned hack. CodeWall was tasked with identifying vulnerabilities and gaps in McKinsey’s Lilli chatbot, which the consulting firm rolled out in 2023 (and is now used by most McKinsey employees and clients). Hilariously, McKinsey’s chatbot fell to a simple SQL injection attack, the kind that used to be very common around the web. The entire tale is cautionary, though: As more companies rush to embrace AI for things like corporate chatbots and internal documentation, hackers themselves are turning to AI to automate their attacks. That’s what CodeWall did here, and the researchers’ success shows that this is only the beginning. 

Newsletter Icon

Get Our Best Stories!

Stay Safe With the Latest Security News and Updates


SecurityWatch Newsletter Image

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy
Policy.

Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!


Salesforce Issues New Security Alert Tied to Third Customer Attack Spree in Six Months

Salesforce just can’t catch a break. ShinyHunters, the same threat group behind attacks on Google, Grubhub, Pornhub, and Kering (the parent company of Gucci, Yves Saint Laurent, and Balenciaga), is apparently back with the third series of attacks in six months, again using stolen data from corporate Salesforce implementations. According to CyberScoop, Salesforce itself issued a security alert to its customers, stating that it’s investigating the attack spree and that the data isn’t from a vulnerability in Salesforce, despite what ShinyHunters claims, which also says it has data from more than 100 new companies. Instead, Salesforce says the attacks are identity-based, meaning attackers are gaining access to publicly facing systems using compromised accounts or other connected systems. 

Recommended by Our Editors

Regardless of how the data is leaking, Salesforce is advising customers to ensure their implementations are properly configured, including the guest user accounts that ShinyHunters uses to obtain sensitive data. It’s a bit of a difficult spot for the company, since it’s not a problem with their software that’s to blame, but the way that their customers have the software configured. Expect to hear more from ShinyHunters in the near future, as it starts selling or sharing the data it claims to have collected. 


Second Major Hack Hits Bell Ambulance, Affecting 238,000 People

When you call an ambulance, the last thing you’re probably worried about is your personal data and who’ll end up looking at it. Unfortunately, the data of about 238,000 people associated with Bell Ambulance, a Wisconsin-based company with operations around the country, is in the hands of hackers who breached the company’s systems, according to SecurityWeek. 

Even worse, this isn’t even the first time the company has been hacked. Last year, in February, the company lost over 219GB of data on over 100,000 people in a ransomware attack. The company notified the Maine Attorney General’s office of the breach (which made it public), notified the affected individuals, and offered them 12 months of identity theft protection. In a statement, Bell representatives say they’ve conducted a full investigation into the incident, secured their accounts and systems, and reset all passwords.

As we’ve mentioned before, getting hacked once actually increases the odds you’ll get hacked again, so it’s important to lock down your data as much as possible.

About Our Expert

Alan Henry

Alan Henry

Managing Editor, Security


Experience

I’ve been writing and editing stories for almost two decades that help people use technology and productivity techniques to work better, live better, and protect their privacy and personal data. As managing editor of PCMag’s security team, it’s my responsibility to ensure that our product advice is evidence-based, lab-tested, and serves our readers.

I’ve been a technology journalist for close to 20 years, and I got my start freelancing here at PCMag before beginning a career that would lead me to become editor-in-chief of Lifehacker, a senior editor at The New York Times, and director of special projects at WIRED. I’m back at PCMag to lead our security team and renew my commitment to service journalism. I’m the author of Seen, Heard, and Paid: The New Work Rules for the Marginalized, a career and productivity book to help people of marginalized groups succeed in the workplace.

Read Full Bio

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article What The USB Port On A Soundbar Is Really For – BGR What The USB Port On A Soundbar Is Really For – BGR
Next Article Apple is Aiming to Add a System-Wide Liquid Glass Slider to iOS 27 Apple is Aiming to Add a System-Wide Liquid Glass Slider to iOS 27
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Bambu Lab said to have resolved Labubu IP dispute with Pop Mart · TechNode
Bambu Lab said to have resolved Labubu IP dispute with Pop Mart · TechNode
Computing
OnePlus’ US Community has turned into a ‘ghost town,’ users say
OnePlus’ US Community has turned into a ‘ghost town,’ users say
News
ByteDance denies reports of regulatory meeting over Doubao AI Phone
ByteDance denies reports of regulatory meeting over Doubao AI Phone
Computing
Less respawning, more re-rolling: six of the best board games based on video games
Less respawning, more re-rolling: six of the best board games based on video games
News

You Might also Like

OnePlus’ US Community has turned into a ‘ghost town,’ users say
News

OnePlus’ US Community has turned into a ‘ghost town,’ users say

4 Min Read
Less respawning, more re-rolling: six of the best board games based on video games
News

Less respawning, more re-rolling: six of the best board games based on video games

6 Min Read
A Deal That Just Makes Sense: Save 0 on This 55-Inch Hisense M7 Smart TV
News

A Deal That Just Makes Sense: Save $100 on This 55-Inch Hisense M7 Smart TV

4 Min Read
Need Another Place to Scroll? Disney+ Adds TikTok-Like Recommendation Feed
News

Need Another Place to Scroll? Disney+ Adds TikTok-Like Recommendation Feed

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?