Hackers Exploit ChatGPT Tool To Write Malicious Codes

Hackers claimed to have gained access to i2VPN’s main admin dashboard using information from hundreds of thousands of users after successfully cracking the admin credentials.

Hackers Exploit ChatGPT Tool To Write Malicious Codes
Hackers claimed to have gained access to i2VPN’s main admin dashboard using information from hundreds of thousands of users after successfully cracking the admin credentials.

SafetyDetectives’ cybersecurity team is said to have discovered an i2VPN incident. On Monday, May 29, 2023, hackers allegedly posted what they claimed to be private information from i2VPN on Telegram, including the admin’s email address and password.

Download i2VPN, a free VPN proxy server app with no registration required, from the App Store or Google Play.

The message was posted on an Arabic-language hacker channel along with the login details for the admin and the URL for the VPN service’s dashboard (e-mail address and password) which translates as “Now go install a free, unsecure VPN service,” according to a web translation.

Additionally, they had screenshots of what appeared to be the backend of the main dashboard, which showed users’ subscription panels, data centers, and some user information.

Hackers have exposed the admin credentials of a VPN Service Provider in a Telegram Group, allowing access to a significant amount of user data and data centers.

As of May 2023, i2VPN has been downloaded over 500,000 times and is also available for iOS devices, though the exact number of downloads from the App Store is not publicly available.

The correlation between each of the estimated 500,000 downloads from the Google Play Store (as well as each iOS download) and a specific user account that could be affected by this alleged breach is theoretical but not proven. In other words, the alleged data leak may have an impact on at least 500,000 people.

The information exposed in the screenshots included:

  1. User IDs
  2. User account names
  3. Registered email addresses
  4. Details relating to premium subscriptions, including subscription payment methods and expiry dates

The information mentioned above may be used by hackers to track user behavior and commit fraud.

Potential Impacts

Hackers may be able to access personal data or find a backdoor to track users’ online activities using the i2VPN exposed admin credentials.

Cybercriminals may also use the disclosed account information for phishing attacks, impersonating people or luring them into disclosing sensitive personal information by using the registered names and email addresses.

What Should You Do if You Think You’re Affected?

Consider improving your security if you have an i2VPN account or subscription. To prevent further compromise, think carefully about whether to keep using the service, review accounts, platforms, and websites visited while connected, and scan your device for sensitive files or communication. To prevent further compromise, update user credentials and search your device for sensitive files or communications.

What Are Telegram Leaks and Why Should You Care?

Hackers may frequently use Telegram, a private messaging service, to communicate covertly. It employs encryption and grants its users anonymity. As a result, hackers who want to post about data breaches and make the information accessible to a large audience, including those who are the least tech-savvy, can do so on this great platform.

The most recent cyberattacks and data breaches are discovered by SafetyDetectives’ cybersecurity researchers by searching Telegram and the dark web. These channels are frequently used by hackers to publish information before the cybersecurity incident is made public.

This article reports on potential risks rather than confirmed breaches. The extent and duration of the claimed exposure and who might have accessed the data remain uncertain.

The intention is to educate readers about potential online vulnerabilities and encourage a proactive approach to online safety. It is important to stay alert and mindful of any unusual activity and ensure the safeguarding of personal information wherever possible. Your digital well-being is in your hands.

Originally published at Safety Detectives