
Photo by Nathana Rebouças on Unsplash
Google To Pay A $36 Million Fine In Australia Over Anticompetitive Deals
- Written by Andrea Miliani Former Tech News Expert
- Fact-Checked by Sarah Frazier Former Content Manager
Google has agreed to pay a $35.8 million fine—55 million Australian dollars—in Australia on Monday after the country’s consumer watchdog found the tech giant had harmed competition through its deals with local telecommunications companies.
In a rush? Here are the quick facts:
- Google has agreed to pay a $35.8 million fine over antitrust accusations in Australia.
- The tech giant had agreements with Australia’s largest telecommunications companies, Telstra and Optus, to pre-install Google Search on Android devices.
- The court has yet to determine whether the proposed fine and agreement between the parties are appropriate.
According to the official press release , Australia’s Competition and Consumer Commission (ACCC) accused Google of anti-competitive business practices, including deals with Telstra and Optus—Australia’s largest telecommunications and tech services providers—to pre-install Google Search on Android mobile phones.
“The understandings, which were in place between December 2019 and March 2021, required Telstra and Optus to only pre-install Google Search on Android phones they sold to consumers, and not other search engines,” explained the agency. “In return, Telstra and Optus received a share of the revenue Google generated from ads displayed to consumers when they used Google Search on their Android phones.”
Google acknowledged the anti-competitive practices and agreed to pay the fine. The company also committed to avoiding similar arrangements and to removing the mandatory pre-installation of the Google Search app on mobile devices.
According to Reuters , Google said that it’s pleased to resolve concerns and collaborate with the ACCC. The arrangements with the telecommunications companies have been in place since 2017.
“We are committed to providing Android device makers more flexibility to pre-load browsers and search apps, while preserving the offerings and features that help them innovate, compete with Apple, and keep costs low,” said a spokesperson from Google.
The court has yet to determine whether the proposed fine and agreement between the parties are appropriate.
Google is also facing antitrust challenges in other jurisdictions. In the European Union, regulators are investigating its AI Overview tool , while in the United Kingdom, the antitrust watchdog recently announced stricter measures to assess Google’s dominance in search services. Since 2024, the tech company has also been in a legal antitrust battle with the U.S. Department of Justice .

Image by vecstock, from Freepik
Hackers Use Phone Scams and New Exploits, Breached 618 Firms
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
Hackers from EncryptHub combine social engineering tactics with sophisticated exploits, breaching over 600 organizations across the globe.
In a rush? Here are the quick facts:
- EncryptHub hackers mix social engineering with advanced malware to breach systems.
- Group already compromised 618 organizations worldwide, researchers warn.
- Malware SilentCrystal hides in fake system folders, downloads via Brave Support.
Researchers from Trustwave SpiderLabs have uncovered a new hacking campaign by the group EncryptHub, which mixes phone scams with advanced technical tricks to break into victims’ computers.
The hackers start by pretending to be IT support staff, making direct phone calls to build trust with their targets. They then persuade victims to grant them access to their computers through Microsoft Teams, or remote desktop connections. Once connected, the attackers run commands that secretly download malware.
EncryptHub , also known as LARVA-208 and Water Gamayun, has already compromised 618 organizations worldwide. “Social engineering remains one of the most effective tools in a cybercriminal’s arsenal, and the emerging threat group EncryptHub has hopped right on the bandwagon to leverage,” the researchers said.
One of the main flaws used in this campaign is a Windows vulnerability called CVE-2025-26633, also known as ‘MSC EvilTwin’. It allows hackers to trick Windows into loading fake system files that run malicious code. The attackers use this loophole to take control of infected machines.
The hackers are also deploying new tools. One, called ‘SilentCrystal’, hides its malware in fake system folders and downloads payloads from Brave Support, a legitimate browser help platform. Another is a SOCKS5 proxy backdoor that secretly connects compromised computers to EncryptHub’s command centers.
In addition, the group has set up a fake video call service, rivatalk.net, to spread malicious installers disguised as conferencing software. Once installed, it runs hidden PowerShell scripts to steal data, maintain access, and disguise hacker traffic as normal browsing activity.
Trustwave SpiderLabs warns that EncryptHub is becoming more dangerous by blending scams, stolen trust, and new malware. They conclude the group is “a well-resourced and adaptive adversary,” making user awareness, patches, and fast response more critical than ever.