Browsing category

Incidents

Hacker Compromises Microsoft’s Windows 10 Browser in Just 18 Seconds

Microsoft Edge was hacked twice at this year’s PwnFest Microsoft Edge, which the Redmond-based software giant praised on several occasions for its high level of security, was hacked twice at PwnFest, with one of the attacks being successfully completed in no less than 18 seconds. Security experts from Chinese firm Qihoo 360 managed to steal […]

Bangladesh central bank team in Manila to retrieve cyber heist funds

A Bangladesh central bank team arrived in Manila on Monday to work on moving back part of the $81 million stolen from its account in the New York Federal Reserve in February and sent to the Philippines, a Bangladeshi official said. A Philippine court in September adjudged that Bangladesh Bank was the rightful owner of […]

WikiLeaks hit by DDoS attack

The whistle blowing platform, WikiLeaks tweeted on Tuesday (November 08) that the group was hit with distributed denial of service (DDoS) cyberattack over the last 24 hours. The assault involved thousands of unique IP addresses. WikiLeaks founder, Julian Assange denied influencing the outcome of election in Donald Trump’s favor. “We have been under unrelenting DDoS […]

GCHQ belives ISPs can prevent all DDoS attacks

The head of of the GCHQ believes that distributed denial of service (DDoS) attacks could be eliminated completely if internet service providers (ISPs) were to completely rewrite their software and its code. The technical director of GCHQ’s National Cyber Security Centre, Ian Levy, is already preparing to engage in talks with ISPs, such as BT, […]

DDoS attack halts heating in Finland amidst winter

A Distributed Denial of Service (DDoS) attack halted heating distribution at least in two properties in the city of Lappeenranta, located in eastern finland. In both of the events the attacks disabled the computers that were controlling heating in the buildings. Both of the buildings where managed by Valtia. The company who is in charge […]

Unsealed Court Docs Show FBI Used Malware Like ‘A Grenade’

In 2013, the FBI received permission to hack over 300 specific users of dark web email service TorMail. But now, after the warrants and their applications have finally been unsealed, experts say the agency illegally went further, and hacked perfectly legitimate users of the privacy-focused service. “That is, while the warrant authorized hacking with a […]

Dridex and Dyre Malware Gang Members Arrested in the UK

British authorities have arrested fourteen people across the country on suspicion of helping the cybercriminals behind the Dridex and Dyre malware launder ill-gotten funds. Officials believe the fourteen suspects helped launder over $13.6 million across several years. According to the NCA (UK National Crime Agency), police officers arrested 13 men and one woman in London, […]

Hacked User Develops FileZilla Version That Encrypts FTP Passwords

A developer that had his sites hacked because the FileZilla FTP client stores passwords on disk in cleartext has taken things into his own hands and has put together FileZilla Secure, a FileZilla version that encrypts all the user’s credentials with a master password. Launched this past week, FileZilla Secure is a fork of the […]

Seven websites of Indian Embassy hacked, database leaked

Seven domains of Indian Embassy in Europe and Africa has been hacked and published by Kapustkiy & Kasimierz L on Pastebin.com (http://pastebin.com/GqJcwSSc). The countries where Indian Embassy got affected are South Africa, Libya, Italy, Switzerland, Malawi, Mali, Romania. Indian Embassy in South Africa (http://www.hcisouthafrica.in/)  was the first one to be hacked.  The hackers published the […]

How to compromise PLC systems via stealthy Pin control attacks

At the Black Hat Europe 2016 two security researchers devised undetectable attacks that could be used to hack PLC systems avoid being detected. Security researchers at the Black Hat Europe 2016 have presented a new attack method that could be used to hack programmable logic controllers avoid being detected. programmable logic controllers are essential components for […]

DMCA EXEMPTIONS LIFT HACKING RESTRICTIONS

White hat hackers can breathe a little easier for the next two years because of a temporary removal of restrictions imposed on hacking of everything from cars, medical devices, to smart home appliances. Last week the U.S. Copyright Office temporarily removed certain restrictions imposed by the Digital Millennium Copyright Act (DMCA) that had long prevented […]

WILLIAM HILL WEBSITE KNOCKED OFFLINE BY “SOPHISTICATED” DDOS ATTACK

UPDATE: As of late Wednesday night, William Hill’s websites remain offline. Sounding more than a little defeated, the company’s official Twitter feed could offer only the following: “We’re calling it a day but we know it’s not been our best. Techies will be working through the night & Live Chat will answer your queries.” UK […]

Stealth Cell Tower, how to spy on workers with a harmless printer

Stealth Cell Tower, it is an antagonistic GSM base station concealed in an office printer that could be used for surveillance purposes. Are you angry with your boss or your colleagues? Do you want to spy on them? The engineer Julian Oliver has demonstrated how to do it with a tiny cellphone base station concealed in […]

New leak may show if you were hacked by the NSA

Shadow Brokers identifies hundreds of organizations it claims were hacked by NSA. Shadow Brokers—the name used by a person or group that created seismic waves in August when it published some of the National Security Agency’s most elite hacking tools—is back with a new leak that the group says reveals hundreds of organizations targeted by the […]

Hacking forum cuts section allegedly linked to DDoS attacks

HackForums.net has shut down its “Server Stress Testing” section. An online hackers’ forum has deleted a section that allegedly offered paid distributed denial-of-service attacks, following last Friday’s massive internet disruption. HackForums.net will be shutting down the “Server Stress Testing” section, the site’s admin Jesse “Omniscient” LaBrocca said in a Friday posting. “I do need to […]

Researchers expose Mirai vuln that could be used to hack back against botnet

Security researchers have discovered flaws in the Mirai botnet that might be used to mitigate against future attacks from the zombie network. Scott Tenaglia, a researcher at endpoint security firm Invincea, found a weakness in the HTTP flood attack that Mirai is capable of mounting. Specifically a stack buffer overflow vulnerability in the code that […]

Michigan State University hacked, personal information leaked online

The young hacker Mys7erioN announced to have hacked into the database of a US organization, the Michigan State University. Data leaked online. Today I was contacted via Twitter by Mys7erioN who revealed me to have hacked into the database of a US organization, the Michigan State University. As proof of the hack, Mys7erioN published on Pastebin  the records […]

36-year-old Pennsylvania man gets 18 months for phishing nude celebrity pics

Ryan Collins sent fake e-mails that appeared to be from Apple and Google. A 36-year-old Ryan Collins from Pennsylvania was sentenced to 18 months in prison after pleading guilty to hacking the Apple and Google accounts of more than 100 celebrities, including Jennifer Lawrence, Aubrey Plaza, Rihanna, and Avril Lavigne. Collins stole personal information, including […]

BLACKGEAR Espionage Campaign Evolves, Adds Japan To Target List

BLACKGEAR is an espionage campaign which has targeted users in Taiwan for many years. Multiple papers and talks have been released covering this campaign, which used the ELIRKS backdoor when it was first discovered in 2012. It is known for using blogs and microblogging services to hide the location of its actual command-and-control (C&C) servers. This allows […]

Some hacked e-mails, documents from Putin advisor confirmed as genuine

Ukrainian hacking group’s haul shows Russian plans to destabilize Kiev…maybe. MRecently a cache of 2,337 e-mails from the office of a high-ranking advisor to Russian president Vladimir Putin was dumped on the Internet after purportedly being obtained by a Ukrainian hacking group calling itself CyberHunta. The cache shows that the Putin government communicated with separatist forces in […]

Attackers are now abusing exposed LDAP servers to amplify DDoS attacks

LDAP adds to the existing arsenal of DDoS reflection and amplification techniques that can generate massive attacks. Attackers are abusing yet another widely used protocol in order to amplify distributed denial-of-service attacks: the Lightweight Directory Access Protocol (LDAP), which is used for directory services on corporate networks. DDoS mitigation provider Corero Network Security has recently […]