Reddit Sues Australia, ChatGPT Ad Leak & 400K+ Bank Records Exposed

Reddit Sues Australia, ChatGPT Ad Leak & 400K+ Bank Records Exposed

Reddit sues Australia, ChatGPT ad tests leak, Europol nukes a crypto mixer, and a Marquis ransomware breach exposes 400K+ bank customers. Read on to find out the details!

Reddit Sues Australia to Block Under‑16 Social Media Ban, Citing Free Political Speech Threat

Source

Reddit filed a High Court challenge to Australia’s new law that bars people under 16 from accessing social media, arguing the measure unlawfully interferes with the constitutionally implied right to free political communication. The San Francisco firm says it does not meet the law’s definition of “social media” and named the Commonwealth and Communications Minister Anika Wells as defendants just days after the nationwide rollout began.

The suit amplifies a growing legal fight following a separate teen-led challenge and raises stakes for platforms that previously said they would comply. Australian officials insist the rule protects children and vowed to defend it, while critics warn the law forces platforms into invasive age‑verification techniques and could chill youth political engagement; a favorable ruling for Reddit could invite similar challenges by other tech companies.

ChatGPT Ads Leak Points to 2026 Rollout, Raising Privacy Alarms

Source

Revealed strings in a ChatGPT Android beta and reports of unsolicited product suggestions to subscribers suggest OpenAI is internally testing third‑party ad features and could push a rollout in early 2026. The app code references APIs like “AdsDebugInfo” and “AdTarget,” while some paid users saw product prompts mid‑chat. CEO Sam Altman has called ads a “last resort” and recently ordered a “code red” pause on non‑core work, but mounting operating losses and the platform’s enormous, context‑rich user base make advertising a likely eventual revenue pivot.

If ads arrive, the impact on privacy and security could be profound: conversational prompts and follow‑ups may be used to build far richer behavioral profiles than traditional search logs, increasing reidentification and function‑creep risks, and ad APIs or partner integrations could expand third‑party access to sensitive signals, creating new breach and supply‑chain attack surfaces. Paying subscribers who expected an ad‑free experience may face opaque personalization and weak opt‑out options, while regulators and researchers will scrutinize data flows, retention policies and algorithmic targeting. Any rollout will need strong transparency, minimal raw data sharing, and robust user controls to avoid widespread trust erosion.

Europol Nukes Major Crypto Mixer in “Operation Olympia,” Seizes 12TB and $29M

Source

Europol, with Swiss and German authorities and support from the Joint Cybercrime Action Taskforce and EuroJust, dismantled servers tied to cryptomixer.io during Operation Olympia (Nov 24–28, 2025), seizing 12 TB of data and over $29 million in Bitcoin. Investigators say the mixer handled more than $1.5 billion in laundering since 2016 and served ransomware groups, dark‑web markets and other criminal enterprises. Authorities say the hybrid service operated on both the clear web and dark web, and that the seized material will aid in tracing funds and identifying suspects for potential arrests and further takedowns.

On one hand, the seizure bolsters law‑enforcement ability to disrupt money‑laundering, recover assets and deter criminal use of mixers; on the other hand, the takedown and analysis of extensive transaction logs raises risks around handling sensitive data (secure storage, witness protection and potential leaks) and may push criminals toward stronger privacy tools (decentralized tumblers, privacy coins, coinjoins) that complicate future investigations. The net effect is likely a temporary disruption to criminal finances and improved investigative leads, but also an accelerated arms race between investigators and privacy‑focused laundering techniques.

Ransomware at Marquis Exposes Data of 400,000+ Bank Customers

Source

Marquis Software Solutions detected a ransomware intrusion on August 14, 2025, after attackers breached a SonicWall firewall and exfiltrated client files containing customer personal information; the Texas‑based marketing firm, which serves over 700 banks and credit unions, has confirmed 74 affected institutions and data on 400,000+ individuals (including names, DOBs, addresses, TINs/SSNs, bank account and card numbers), with large state impacts such as Texas (354,000) and Maine (42,784); Marquis began notifying customers in late October–November 2025 and is offering complimentary credit monitoring while law enforcement investigates.

Exposed SSNs, TINs, bank account and card numbers create high risk of identity theft, financial fraud, targeted phishing and account takeover for affected customers and elevated regulatory and remediation burdens for client banks and credit unions. The apparent use of a SonicWall SSLVPN exploit (linked in other incidents to the Akira ransomware family) underscores the need for urgent firewall patching/hardening, MFA and credential rotation across downstream organizations, plus accelerated incident response, customer notification, credit freezes/monitoring, forensic review of logs, and coordination with law enforcement to contain misuse and prevent secondary attacks.