Browsing category

Incidents

Armenian Hackers Leak Azerbaijani Banking and Military Data

ARMENIAN HACKERS LEAKED PERSONAL DETAILS OF GOVERNMENT OFFICIALS AND ALSO DEFACED EMBASSY SITES TO CELEBRATE 25 YEARS OF ARMENIAN INDEPENDENCE. Armenian hackers from Monte Melkonian Cyber Army (MMCA) have leaked a trove of data which they claim belongs to Azerbaijani banks, military and police servers. In an email to HackRead, one of the representatives from MMCA said that reason for […]

A nation-state actor is testing methods for a massive takedown of the Internet

According to the popular cyber security experts an unknown nation state actor may be running tests for taking down the entire internet infrastructure. What happens if someone shuts down the Internet? Is it possible? Our society heavily depends on technology and the Internet is the privileged vector of the information today. Blocking the Internet could paralyze […]

IoT devices being increasingly used for DDoS attacks

Malware is infesting a growing number of IoT devices, but their owners may be completely unaware of it. Malware targeting the Internet of Things (IoT) has come of age and the number of attack groups focusing on IoT has multiplied over the past year. 2015 was a record year for IoT attacks, with eight new […]

DDoS Mitigation Firm Has History of Hijacks

Last week, KrebsOnSecurity detailed how BackConnect Inc. — a company that defends victims against large-scale distributed denial-of-service (DDoS) attacks — admitted to hijacking hundreds of Internet addresses from a European Internet service provider in order to glean information about attackers who were targeting BackConnect. According to an exhaustive analysis of historic Internet records, BackConnect appears to have […]

Matchlight Dark Web data leak detection software available worldwide

Terbium Labs’ software can now be used to detect when data belonging to companies is being flogged in the underground. Terbium Labs has announced the release of Dark Web data analytics software Matchlight to corporate players that wish to be alerted to the theft of data immediately — rather than days or months after the […]

iSpy Keylogger

Keyloggers have always been present in attackers’ toolkits. They give attackers the power to record every keystroke from a victim’s machine and steal sensitive information. Zscaler ThreatLabZ recently came across a signed keylogger campaign in our cloud sandbox. In this blog, we will provide an analysis of this malicious commercial keylogger, known as iSpy. Written […]

Windows Safe Mode Can Be Used to Steal PC Logins, Disable Antivirus Software

Safe Mode proves to be a valuable tool for hackers.Research published by CyberArk, a US cyber-security vendor, reveals various attack scenarios that leverage Windows Safe Mode to carry out malicious attacks undetected, harvest PC credentials from nearby workstations, or to disable security software. The described attack is not a security vulnerability, but an exploitation scenario […]

Mamba: The new Full Disk Encryption Ransomware Family Member

A Brazilian Infosec research group, Morphus Labs, just discovered a new Full Disk Encryption (FDE) Ransomware this week, dubbed Mamba. Mamba, as they named it, uses a disk-level encryption strategy instead of the conventional file-based one. This may be just the beginning of a new era for the Ransomwares. In this article, Renato Marinho (@renato_marinho), […]

Neutrino EK’s Afraidgate pushed in malvertising attack

During the past few weeks there has been an increase in malvertising attacks, for example via a series of compromises of open source Revive ad servers which is still continuing. What’s interesting to note is that some compromised sites have more value than others and this is especially true when those sites happen to be used to serve […]

Science press site hacked; hackers release… random crap

Eurekalert pulls everybody’s access after security breach.For many science journalists, a week would not be complete without one or more trips to the Eurekalert website. Put together by the American Association for the Advancement of Science, Eurekalert is one-stop-shopping for press releases about the latest scientific findings, aggregating material provided by scientific journals, research institutions, […]

How to hack Google FR by exploiting a cross-site scripting flaw

The security expert Issam Rabhi (@issam_rabhi) has discovered a cross-site scripting vulnerability in Google France. The giant already fixed it. A security expert from French security outfit Sysdream, Issam Rabhi (@issam_rabhi), discovered a cross-site scripting vulnerability in Google France. Yes, you‘ve got it right, the website of the IT giant was affected by one of the […]

6.6 million plaintext passwords exposed as site gets hacked to the bone

Next time a site wants your personal info, remember the ClixSense debacle. Plaintext passwords, usernames, e-mail addresses, and a wealth of other personal information has been published for more than 2.2 million people who created accounts with ClixSense, a site that claims to pay users for viewing ads and completing online surveys. The people who dumped […]

Microsoft Publisher files spread backdoor to steal corporate data, Bitdefender warns

A targeted spam wave is infecting Windows computers with a backdoor capable of stealing sensitive corporate information from medium and small-sized businesses. Bitdefender antispam researchers have identified a couple of thousand emails containing .pub attachments posing as orders and invoices for products. The email senders impersonate employees from small and medium-sized businesses from the UK and […]

324,000 Financial Records leaked online, who is the victim?

A hacker leaked a data dump containing more than 320,000 Financial Records apparently stolen from an Israeli payment processor. Another data breach is in the headline, roughly 324,000 financial records have been leaked online. The financial data appears to have been stolen either from payment processor BlueSnap or its customer Regpack, a hacker published a link to the archive (a file Titled […]

Thousands of infected FTP servers net attackers $88k in cryptocurrency

Targets foot hardware and electricity costs of mining Monero coins. Attackers are draining the CPU and power resources of thousands file transfer protocol servers by infecting them with malware that surreptitiously mints the relatively new crypto currency called Monero, researchers said. A notable percentage of the 3,000 or so infected servers are powered by Seagate Central, […]

Hands-on: Blue Hydra can expose the all-too-unhidden world of Bluetooth

Bluetooth Low Energy devices like smart watches, “wearables,” give you up all day. My new neighbor was using AirDrop to move some files from his phone to his iMac. I hadn’t introduced myself yet, but I already knew his name. Meanwhile, someone with a Pebble watch was walking past, and someone named “Johnny B” was idling […]

Two CWA Hackers Arrested for Hacking Several Three-Letter US Agencies

Authorities have arrested five suspected members in total. The FBI has arrested and charged two members of CWA (Crackas With Attitude) hacking squad, making them the fourth and fifth members that are apprehended by authorities. The names of the latest supposed CWA members are Andrew Otto Boggs, aka “Incursio,” 22, of North Wilkesboro, North Carolina, and […]

Brazzers’ Forum Hack Exposes 800,000 email IDs and Passwords

It is being reported that a widely followed porn website Brazzers has been hacked by cyber criminals and over 800,000 email IDs and passwords currently stand exposed and vulnerable to exploitation. Vigilante.pw, monitoring website, was the first one to report about this latest data breach targeting Brazzersforum(dot)com while and Motherboard, later confirmed the news. It […]