Browsing category

Incidents

Hidden Voice Commands Embedded in YouTube Videos Can Hijack Your Smartphone

Some attacks are hard to spot even by human subjects. A series of distorted voice commands surreptitiously hidden in YouTube videos can force unprotected Android or iOS smartphones to carry out malicious operations, researchers have discovered. Controlling smartphones with voice commands was already done last year when two security researchers from French agency ANSSI have used […]

Wendy’s admits credit card hack is far worse than first thought

The number of locations affected rocketed by more than three-fold. Restaurant chain Wendy’s said that the number of restaurants affected by a credit card hack has more than tripled since its initial estimates. The Columbus, Ohio-based company updated a statement on its website to confirm that 1,025 locations are now thought to have been affected by […]

TP-Link forgets to register domain name, leaves config pages open to hijack

The domain name’s new owners want $2.5 million to give it back. In common with many other vendors, TP-Link, one of the world’s biggest sellers of Wi-Fi access points and home routers, has a domain name that owners of the hardware can use to quickly get to their router’s configuration page. Unlike most other vendors, however, […]

SECOND CELEBGATE HACKER PLEADS GUILTY

A second US man has pleaded guilty to stealing intimate pictures of celebrities using a phishing scam. Edward Majerczyk, 28, who resides in Chicago and Orland Park, Illinois, was charged with hacking into the Apple iCloud and Gmail accounts of more than 300 people, including Hollywood celbrities. In a plea bargaining deal, Majerczyk agreed to […]

Klepto Zepto could steal millions in looming ransomware wave

Talos have observed a large uptick in the Zepto ransomware and have identified a method of distribution for the Zepto ransomware, Spam Email. Locky/Zepto continue to be well known ransomware variants and as such we will focus on the spam email campaign. We found 137,731 emails in the last 4 days using a new attachment […]

A Chinese gang in Pakistan specializes in ATM Skimmer attacks

The Federal Investigation Agency in Pakistan is investigating a Chinese organization that is specialized in attacking ATM machines by using skimmer devices. A few days ago I reported the story of the security expert Benjamin Tedesco that has spotted an ATM skimmer during his vacation in Vienna. The ATM skimmer was quite impossible to detect to common people and […]

Intel Refutes Claim That It Includes Backdoors in Its CPUs

Company also doesn’t support encryption backdoors. Via a statement from Steve Grobman, Chief Technology Officer for Intel Security, Intel has denied claims made by hardware security expert Damien Zammit, who detailed a secret subsystem in Intel x86 CPUs that could have the ability to function as a secret backdoor. The issue brought up by Zammit revolves […]

Global terror database World-Check leaked

Thomson Reuters ‘working furiously’ to secure 2.2 million sensitive records. The terrorist database used by global banks and intelligence agencies World-Check has reportedly leaked online. The mid-2014 version of the database contains some 2.2 million records and is used by 49 of the world’s 50 largest banks, along with 300 government and intelligence agencies. The Thomson […]

Hackers steal $10 million from a Ukrainian bank through SWIFT loophole

Hackers have stolen $10 million from an unnamed Ukrainian bank, according to an independent IT monitoring organization. The Kyiv branch of ISACA, the Information Systems Audit and Control Association, reported this week that the theft had occurred via the SWIFT international banking system, the organization responsible for managing money transfers between financial institutions worldwide. ISACA […]

Large CCTV Botnet Leveraged in DDoS Attacks

Our security operations team investigate and mitigate multiple denial of service (DDoS) attacks every single day. One recent case caught our attention because of the intensity and duration of the attack, and – as we discovered through some research – how it was being done. In this article, we’ll share the specifics in an effort to track […]

Google CEO Sundar Pichai’s Social Media Account Hacked

OurMine behind the hacking of Google CEO Sundar Pichai’s Quora account. In our recent article, we had reported that how new hacking group, OurMine have been targeting elite tech accounts around the world. Their recent victim was Daniel Ek, the CEO and founder of Spotify. They are also responsible for breaking into the social media accounts […]

Hacker Selling 651,894 Patient Records on the Dark Web

The hacker is asking over $700,000 for the whole data. A hacker that goes by the name of TheDarkOverlord has put up for sale on the Dark Web three databases stolen from three healthcare institutions in the US. The hacker is selling the data on The Real Deal marketplace, and he says he breached these companies […]

Teardrop Attack: What Is It And How Does It Work?

Short Bytes: Teardrop attack is a type of Denial of Service (DoS) attack which exploits the fragment offset field in the IP header to produce buggy fragments which are then delivered to the target machine. Unable to rearrange the fragments, the victim keeps on accumulating the fragments until it crashes.  As the name suggests, the Teardrop […]

Researchers Hack Their Way into Punkey PoS Malware Backend

Criminals infected over 200 US businesses with PunkeyPOS. Security researchers from PandaLabs have hacked their way into the administration panel of the PunkeyPOS point-of-sale malware and have discovered an ongoing campaign targeting stores in the US. PunkeyPOS, or Punkey, is point-of-sale malware that first appeared in April 2015 from an older version of the NewPoSThings PoS […]

UBER HACKING: HOW WE FOUND OUT WHO YOU ARE, WHERE YOU ARE AND WHERE YOU WENT!

Here at Integrity we love to be challenged, so whenever there is some free time, there is encouragement to do research or to break some things (http://labs.integrity.pt/advisories/) in addition to play foosball. We (@r0t1v, @fjreis, @fabiopirespt) decided to use this time to jump into some bug bounties. What is a bug bounty? As stated in […]

​Hackers hit central banks in Indonesia and South Korea

The central banks of Indonesia and South Korea have been hit by distributed denial of service attacks on their public websites, with officials linking the timing of the attacks to a pledge made in May by hacktivist group Anonymous. In the month since activist hacking group Anonymous pledged to target banks across the world, senior […]

JScript-toting Ransomware Can Steal Your Passwords and Bitcoin Wallets, Too

In an effort to develop a target base and increase the conversion rate of victims, ransomware perpetrators will try to veer away from well-known families and create new family sporting seemingly new techniques—with varying degrees of practicality. This is the case with the RAA ransomware, which Trend Micro detects as RANSOM_JSRAA.A. While most ransomware take the […]

Former Twitter CEO Dick Costolo was hacked

OurMine, the same group that hacked Mark Zuckberg’s Pinterest and Twitter accounts, seems to be behind it. Even the former CEO of Twitter isn’t protected from the occasional security hack. Earlier this afternoon, three tweets were sent from Dick Costolo’s account claiming to be from a group called OurMine. The tweets have since been deleted […]

T-Mobile insider steals customer data to make a quick koruna

The employee tried to cash in by stealing and selling the data of up to 1.5 million Czech customers. T-Mobile’s arm in the Czech Republic has uncovered an employee’s intentions to steal customer data in order to sell it on for a profit. The former staff member tried to sell the T-Mobile customer marketing data, […]

GoToMyPC Remote Desktop Service Under Attack, Resets User Passwords

Incident seems to be another ATO (account takeover) attack.GoToMyPC decided to reset user passwords after attackers tried to hack into customer accounts over the weekend using what the company calls a “very sophisticated password attack.” GoToMyPC is a service that allows users remote access to their home or work computers using a suite of desktop […]

You Acer holes! PC maker leaks payment cards in e-store hack

Lost info includes names, addresses, numbers and security codes. Acer’s insecure customer database spilled people’s personal information – including full payment card numbers – into hackers’ hands for more than a year. The PC maker has started writing to customers [PDF] warning that their personal records were siphoned off from its online store by crooks between […]