ISIS Moving To The Dark Web To Escape Hackers And Spread Its Message

Short Bytes: In order to protect its online operations from security agencies and hackers, and to propel its propaganda, ISIS is looking to find shelter in the Dark Web. It should be noted after the recent attacks on Paris, the terrorist group is facing more surveillance and cyberattacks. The Islamic State terrorists are learning new […]

ISIS Releases Another Kill List of US Military and Security Officials

ISIS has unveiled list of U.S. officials who are on their target — The list includes names of both current and former government officials and military personnel. Late on Saturday, a group of hackers calling themselves “Islamic State Cyber Army,” unveiled a list of officials who are either currently working for or have in past […]

‘Spying’ on Islamic State instead of hacking them

In the wake of the Paris attacks, the vigilante hacker group Anonymous has declared war on so-called Islamic State using the internet and claims to haveshut thousands of Twitter accounts used by IS operatives. But a much smaller online group has also emerged, with quite a different strategy – and they claim they’ve already thwarted […]

Here’s the ISIS OPSEC Manual Used to Train Recruits About Cyber-Security

ISIS hijacks Kuwait security firm’s OPSEC manual.Yesterday, various Twitter accounts were tweeting about an ISIS OPSEC manual describing the terrorist group’s cyber-security practices. The document, embedded below in a translated form, details various techniques recommended by the group to its new recruits. While initially we thought the ISIS OPSEC manual was uncovered by the recent […]

Hacking and exploiting Active Directory Permissions

PowerView is a PowerShell tool to achieve network information on Windows domains for cyber security services and ethical hacking training professionals. It implements diverse practical meta-functions, including some user-hunting functions which will discover where in the network explicit users are logged in. It can also find which machines in the domain network the user has […]

Researchers say they’ve cracked the secret of the Sony Pictures hack

Log wipers, timestompers may have helped hackers stay quiet in terabyte raids. Damballa researchers Willis McDonald and Loucif Kharouni say the attackers who flayed Sony Pictures with disk-cleansing malware may have stayed hidden using newly-uncovered anti-forensics tools. The pair found the updated weaponry in the latest version of the Destover malware, best known as the […]

CryptInfinite or DecryptorMax Ransomware Decrypted

We have received a lot of reports about a new ransomware that we are calling CryptInfinite based on the Windows Registry key created by this ransomware.  Other sites have also been calling this ransomware DecryptorMax due to a hard coded string found inside the ransomware executable. At first glance this ransomware looked secure, but on further inspection by Fabian Wosar of Emisoft it was […]

Hackers Target Starwood Hotels, Steal Credit Card Data Using Malware

Chain of hotels owned by Starwood Hotels & Resorts Worldwide properties faced a data breach earlier this year and hackers got access of debit and credit card details of hotels’ customers. The breach also included two hotels from New Jersey, The Sheraton Atlantic City Convention Center Hotel and W Hoboken; both the hotels faced the […]

ISIS Hackers Post A “Wanted To Be Killed” List Of U.S. Officials

Short Bytes: The ISIS hackers, calling themselves the “Islamic State Cyber Army,” have used Twitter to post the names and addresses of employees of the FBI, the CIA, the National Guard, the U.S. Defense Intelligence Agency etc. The Twitter accounts posting these threats have now been suspended. The ISIS-affiliated hackers have taken the Twitter-route to post a list […]

Smart eBay Scammer Tricks, Steals Identity of His Investigating Officer

Rohit Jawa, a 25-year-old man, was arrested in Cincinnati, Ohio on 15th June 2015 for scamming on eBay — He was accused of defrauding eBay customers for making fraudulent purchases. Rohit started his fraudulent operations in 2013 and employed 9 eBay and 18 PayPal accounts for carrying out his fraudulent purchases. He may now face […]

Anonymous Warns About Possible “Worldwide Attack By ISIS” Today (Updated)

Short Bytes: The Anonymous hacktivists have claimed that they have uncovered a secret Islamic State plan for a worldwide terror attack this Sunday. The group has warned about the potential attacks in Paris, the US, Indonesia, Italy, and Lebanon.  Update: However, Now Anonymous is distancing itself from the reports released yesterday. Anonymous released several statements over Twitter […]

Anonymous Has Shutdown 28,000+ ISIS’ Twitter Accounts Since OpParis Began

The online hacktivist Anonymous shut down 8824 Twitter accounts of ISIS members + followers in the first phase of OpParis — In the second phase the hacktivists claim to shut down more 20,000 twitter accounts — 20,000 + 8824 = 28,824. By enduring the death of more than 120 people in Paris attacks, the ISIS has made […]

Self-Proclaimed Anonymous Hacktivists Predict Potential ISIS Terror Attacks

Someone is using Anonymous’s name to spread rumors about ISIS planning to target different events worldwide. A Pastebin post posted by someone claiming to have a connection with the Anonymous hacktivist movement claims they have prior knowledge to a series of terrorist attacks planned by the so-called Islamic State (IS, previously ISIS/ISIL) group starting from 22nd November 2015. The post claims the inside […]

How to Baffle Web Trackers by Obfuscating Your Movements Online

ONLINE AD NETWORKS and search engines love it when you surf around. Everything you do—every page you load, every query you type—helps them build a profile of you, the better to sell ads targeting your interests. Spy agencies are probably also happy to track your online moves. But today they’re all having trouble figuring me […]

VMware Patches Pesky XXE Bug in Flex BlazeDS

VMware has patched an information disclosure vulnerability affecting a number of its products that use Flex BlazeDS. The original vulnerability was discovered and disclosed in August by Matthias Kaiser of Code White GmbH. Researchers there found a XML External Entity flaw in Apache Flex BlazeDS. XXE vulnerabilities are found in web applications that parse XML […]

eBay Scammer Steals Identity of the Police Officer Investigating His Case

Rohit Jawa fools officer into revealing personal details. Police officers investigating an eBay scammer must have been very surprised when the criminal, in a bold act of courage, stole their identities to make further fraudulent purchases. Rohit Jawa, 25, Cincinnati, Ohio, was arrested on June 15, 2015, after running an online scam using eBay and PayPal […]

Indian Hackers Attack Pakistan Government and Defense Websites

Short Bytes: In the past, Pakistani and India cyber hackers have been targeting each other by hacking different government websites. In the latest development, India-based hacking agencies have defaced some government and defense websites of Pakistan. In the recent hacking attacks by the India-based hacking agencies, some government and defense websites of Pakistan have been attacked. […]

ISIS issues anti-hacking guidelines for its online supports after Anonymous threats

After calling Anonymous ‘Idiots’ ISIS issues guidelines to its cronies to protect from hackers like Anonymous The Islamic State militant ISIL who have claimed responsibility for the Paris terror attacks, responded to Anonymous’ declaration of “total war,” calling the hacker group “idiots” while offering guidance to its online followers to prevent cyberattacks. The move followed […]