Posts

Showing posts from December, 2019

Microsoft Enters 2020 with Two New Products

Image
Microsoft plans to come up with two products with the advent of the New Year, Windows 10X-powered Surface Neo and Android-powered Surface Duo and this could be an indication of 2020 being the year of foldable and dual-screen devices from smartphone and PC creators. Microsoft's new operating system, Windows 10 X, is set to power the main rush a.k.a the first wave of foldable and dual-screen equipment scheduled for holiday 2020 and Surface Neo is said to have been the primary equipment to be dispatched with Windows 10 X, however, the Redmond giant is additionally preparing the OS for dual-screen PCs from accomplices. Windows 10 X is additionally expected to power the dual-screen PCs created by Microsoft OEM accomplices like HP, Dell, and Lenovo. A leak as of late affirmed that Windows 10 X will be coming to workstations and other customary PC form factors in the future, however apparently the operating system is as yet 'immature'. Anyway because of the moderate-pac...

Alert! USB Flash Drive Malware: Threats Decoded!

Image
The cybercriminals have gotten all the savvier when it comes to finding out new ways of administering malware into the victims’ devices. The next in the list happens to be “Malicious USB sticks”. These are employed whenever an attacker needs a “physical” entrance to a computer or any device for that matter. The first related incident goes back a decade when the highly malicious, “Stuxnet” worm was disseminated to attack Iranian networks by means of USB sticks. An “unattended” USB flash drive might as well cause an equally malicious problem if plugged into a host network or system. These drives could be carrying viruses or even ransomware. The ultimate motive of these drives could range from easy-going hacking into systems to disrupting major businesses and their operations. These USB sticks are extremely malicious and could lead to major setbacks and cyber harm for victim organizations and their clients and other individuals at large. Reportedly, there are several other...

Hackers Bypass the 2-step Verification to Invade Government Systems and Industries

Image
2-step verification is an extra security measure that an application uses when connecting to a service or a device. But the 2-step authentication was avoided by a group of hackers from China known as APT20. The government, industries, and various corporations across the world are concerned about the issue. This is disturbing news for the world of cybersecurity. APT 20, a criminal hacking organization from China was able to avoid the important 2-step verification, that is used as a safety precaution by vast services on the internet such as Google, Whatsapp, Instagram, etc. But above all this, this issue is a major concern for banking institutions that rely on internet services for their conduct. The APT20 group was caught avoiding the 2-step Verification:  After successfully breaking the verification process, APT20 was able to get access to some government agencies, corporate databases, and servers of various industries. The activity was discovered by Fox-It, a Dutch security...

The Russian President created a new Department for information security

Image
Russian President Vladimir Putin signed a decree increasing the number of departments of the Ministry of Foreign Affairs of Russia from 41 to 42.  According to the Facebook page of the Department, the new 42nd Department of the Russian Foreign Ministry will deal with international information security, including the fight against the use of information technologies for military-political, terrorist and other criminal purposes. The decree came into force on December 27, 2019.  The number of employees of the Central office of the Russian Foreign Ministry increased from 3,358 people to 3,391 people.  The decree establishes a staff payroll for a year in the amount of 3,521,914.7 thousand rubles ($57,000). Employees of the Department will have to propose measures to improve legislation to make it easier to cooperate with other countries and international organizations on the topic of information security. " The main idea of the department is the development of g...

Cyber police in Ukraine caught hackers who hacked tens of thousands of servers around the world

Image
Cyber police in the Kharkiv region exposed members of a criminal hacker group who purposefully carried out attacks on private organizations and individuals to illegally gain access to their remote servers. It is established that in this way they managed to hack more than 20 thousand servers around the world. According to employees of the Department for Combating Cybercrime, the attackers sold the hacked accesses to customers. In addition, law enforcement identified all members of this group. So, it included three Ukrainian and one foreigner. All of them were well-known participants of hacker forums and carried out orders hacking remote servers located in the territory of Ukraine, Europe and the USA. Cyber police found that the criminal group had been operating since 2014. Its participants carried out bruteforce attacks on private enterprises and individuals. They used for attacks specialized software that exploited vulnerabilities of Windows-based servers. It is known that att...

Hacker Jailed on Charges of Blackmailing Apple

Image
A twenty-two-year-old hacker has agreed that he tried to threaten Apple company by alleging that he had data of accounts of millions of iPhone users and that he would destroy these accounts if not given the ransom. The hacker is known to be Kerem Albayrak, living in North London, who scared to clear more than 300 million Apple users' iCloud accounts, demanding that the company gave him iTunes reward vouchers amounting to £76,000 ($1,00,000), as a ransom. However, while enquiring about the issue, Apple discovered that Kerem's claims were false, and he didn't jeopardize the company's safety system. Kerem has been charged with the crime of data breach and blackmailing and has been sentenced 2 years of jail imprisonment, and 300 hours of community service (unpaid). Two years back, in March 2017, Kerem e-mailed Apple company's safety unit, declaring to have hacked more than 300 Million iCloud accounts of Apple users. To strengthen his claim, Kerem showed him hacking...

The Heritage Company Went Down After Ransomware Attack

Ransomware attacks continue to cripple different businesses, one more victim has now become apparent. Recently, a telemarketing firm The Heritage The Heritage Company Went Down After Ransomware Attack on Latest Hacking News . from Latest Hacking News https://ift.tt/2F2Qw1W

US Accounting Firm Moss Adams Discloses Data Breach

One of the largest public accounting firms in the United States, Moss Adams, has suffered a data breach. The firm US Accounting Firm Moss Adams Discloses Data Breach on Latest Hacking News . from Latest Hacking News https://ift.tt/39oZ8Og

Cyber Security Company Predicts Cyber Cold War Will Escalate In 2020

Image
A new Cold War will begin in the world in 2020, it will break out in cyberspace. Fake news before the elections will become an Internet trend in politics, and companies and ordinary people need to be wary of old threats - phishing and ransomware viruses. This forecast was made by Check Point IT company in a study available to the Russian Agency for International Information RIA Novosti. According to experts, cyber attacks will increasingly be used as indirect conflicts between small states, which are supported and financed by large countries seeking to expand their spheres of influence. In addition, they predict an increase in the number of cyber attacks on utility and other critical infrastructures, explaining this by the fact that in many cases outdated technologies are used in the field of electricity and water supply. In 2020, an increase in the number of targeted attacks on authorities, specific enterprises and healthcare organizations through mobile malware and ransomwar...

Dating App Accused of Leaking Users’ Private Information from Their Profiles

Image
Security Researcher discovered a leak within the dating app Plenty of Fish  of the data that users had specially set as "private" on their profiles. The leaked information was not straight away obvious to the app users, and the information was scrambled to make it hard to peruse. In any case, utilizing freely accessible tools intended to dissect network traffic, the researcher discovered that it was possible to uncover the data about the users as their profiles showed up on his phone. As indicated by The App Analyst, a 'mobile expert' who expounds on his examinations of mainstream applications on his eponymous blog, POF was in every case quietly restoring the users' first names and postal ZIP codes which was the primary indication that something was truly amiss with the application. In one case, the App Analyst even discovered enough data to identify where a specific user lived. As of late, law enforcement also has on multiple occasions issued admonitio...

Entercom Radio Suffered Outage After Cyber Attack

Popular American radio network Entercom has recently disclosed a cyber attack. While it didn’t cause severe damages, it marks the Entercom Radio Suffered Outage After Cyber Attack on Latest Hacking News . from Latest Hacking News https://ift.tt/2EZ8JNI

Amazon, Rings Sued by a Man Claiming that the Camera was Hacked and used to Harass his Kids

Image
A class-action lawsuit has been filed against Amazon-owned Rings by Alabama resident John Orange. The company has been accused mainly of negligence and invasion of privacy amid other side claims namely breach of an implied warranty, breach of implied contract and violation of California’s Unfair Competition Law against false advertising as it failed to provide enough protection against hacks. Orange claimed that his internet-connected Ring camera which he bought in July 2019 was hacked and used to harass his three children aged seven, nine and ten, as per the lawsuit. Reportedly, the hacker spoke to the kids as they were playing basketball. The argument for a class-action was supported by seven other similar incidents reported by media wherein these devices were hacked as the two-way talk function was used by hackers to talk to unsuspecting children. A mother shared one such disturbing incident which made rounds on social media, it took place in Mississippi wherein the hacker ...

Expert finds a Bug in Twitter that can Expose your Account Information

Image
As if it wasn't enough already, the famous social networking and microblogging website Twitter has suffered yet another data vulnerability recently. In a recent data breach incident, an expert claimed that he was able to exploit a Twitter bug and used it to match more than 17 Million mobile numbers to user profiles. The list of the accounts targeted includes prominent lawmakers and officials. This hack was achieved by exploiting a bug in Twitter's Android application. According to the reports of TechCrunch, Safety expert, Ibrahim Balic discovered that it is attainable to post complete records of created contact information via the contact upload option in the Twitter app. "If you put your contact information .i.e the phone number, the app in return, retrieve user information," says Ibrahim. The users whose phone numbers were matched were from countries like Germany, France, Armenia, Iran, Greece, Turkey, and Israel. In one particular incident, the user whose numb...

Popular Messaging App In UAE ‘ToTok’ Deemed To Be a Government Spy Tool

The popular chat app in the Middle East is currently in hot waters. According to recent investigations, the app has Popular Messaging App In UAE ‘ToTok’ Deemed To Be a Government Spy Tool on Latest Hacking News . from Latest Hacking News https://ift.tt/39mIFtS

Twitter For Android App Bug Allowed Matching 17 Million Twitter Accounts With Phone Numbers

Twitter for Android app had another bug that exposed users’ phone numbers. By exploiting the vulnerability, a researcher succeeded in matching Twitter For Android App Bug Allowed Matching 17 Million Twitter Accounts With Phone Numbers on Latest Hacking News . from Latest Hacking News https://ift.tt/2MAxjsF

NVIDIA Release A Fix For Serious GeForce Experience Vulnerability

NVIDIA have recently fixed a serious vulnerability in GeForce Experience (GFE). Exploiting the flaw could have allowed an attacker to NVIDIA Release A Fix For Serious GeForce Experience Vulnerability on Latest Hacking News . from Latest Hacking News https://ift.tt/2ZtBNq6

Create Custom Extension To Bring Back ‘www’ in Google Chrome Browser

Google’s decision to truncate website URLs by hiding the ‘www’ in its Chrome browser troubled many users. Being the most Create Custom Extension To Bring Back ‘www’ in Google Chrome Browser on Latest Hacking News . from Latest Hacking News https://ift.tt/2SunCjf

Critical Vulnerability In Citrix Could Affect Numerous Enterprises

A researcher has discovered a critical vulnerability in Citrix products that risked thousands of businesses around the world. Exploiting the Critical Vulnerability In Citrix Could Affect Numerous Enterprises on Latest Hacking News . from Latest Hacking News https://ift.tt/2EZVIUs

Twitter For Android App Flaw Could Have Allowed Hijacking of Accounts

Twitter has disclosed a vulnerability that potentially threatened Android users. As revealed, the Twitter for Android app had a flaw Twitter For Android App Flaw Could Have Allowed Hijacking of Accounts on Latest Hacking News . from Latest Hacking News https://ift.tt/2SxCYUg

Kremlin commented on the plans of the US cyber command

Image
Member of the State Duma Committee on International Affairs, Elena Panina, considers the tactics of countering possible "interference in elections", which the US cyber command is developing, as direct aggression against Russia. Earlier, the Washington Post reported that the US cyber command is developing information warfare tactics against high-ranking Russian officials and businessmen in case Moscow tries to interfere in the 2020 elections. The goal of the cyber command may be representatives of the Russian elite. "Attempts by the American side to present these plans as "defensive", as a possible response to the case of "interference in the American elections" look ridiculous. In fact, we are talking about the threat of direct aggression against Russia in the information space," said Panina. According to her, the cynical nature of these actions is manifested in the fact that the United States decided to publicly blackmail Russian politic...

Three Different US Stores Report POS Malware Attacks In The Same Week

Cybercriminals seemed to have stepped up on a malicious campaign in the previous week. Reportedly, three different e-commerce stores in Three Different US Stores Report POS Malware Attacks In The Same Week on Latest Hacking News . from Latest Hacking News https://ift.tt/2Q3vDdp

5 Ways to Minimize Your Company’s Exposure to the Dangers of Shadow IT

According to 77% of the IT professionals recently surveyed by Entrust Datacard, if left unchecked, shadow IT will be a 5 Ways to Minimize Your Company’s Exposure to the Dangers of Shadow IT on Latest Hacking News . from Latest Hacking News https://ift.tt/2ZuctQQ

How to Backup and Restore Android with Coolmuster Android Assistant [Can’t Miss]

As a vital mobile tool, Android phone usually stores a mass of files of our work and life, such as How to Backup and Restore Android with Coolmuster Android Assistant [Can’t Miss] on Latest Hacking News . from Latest Hacking News https://ift.tt/2Fb2cQt

How to Safeguard Your Information While Surfing Online

Did you know that a hacker tries to steal someone’s information every 39 seconds? Browsing the internet can be a How to Safeguard Your Information While Surfing Online on Latest Hacking News . from Latest Hacking News https://ift.tt/2ZuBCL9

Integrate Linux Software with Your IOS Devices

Every device that we own that connects us with the digital world has a system within it that helps connect Integrate Linux Software with Your IOS Devices on Latest Hacking News . from Latest Hacking News https://ift.tt/3637AAP

Mozilla Restored Avast, AVG Browser Extensions To Add-Ons Store After Original Ban

Continuing with their policies to ensure user privacy, Mozilla removed the Avast and AVG browser extensions from their listings. The Mozilla Restored Avast, AVG Browser Extensions To Add-Ons Store After Original Ban on Latest Hacking News . from Latest Hacking News https://ift.tt/2ZwreT7

267 Million Facebook Users’ Data Exposed Online Via Unsecured Database

Facebook has once again made it to the news owing to a security issue. However, this time, Facebook isn’t directly 267 Million Facebook Users’ Data Exposed Online Via Unsecured Database on Latest Hacking News . from Latest Hacking News https://ift.tt/2ZvsINN

Development Team Suffers Cryptocurrency Theft Worth $4,80,000

Image
Hackers stole records relating to the extension unit of an unknown blockchain recently, taking cryptocurrency worth $480,000, which is known as an obscure token called NULS. The developing team working on NULS confirmed on Twitter that it suffered a hacking attack. Earlier in the morning, the company tweeted that around 2 million NULS ($4,80,000) were stolen from its account. From the amount that was stolen, the development team says that more than half the amount lost in the theft has been liquidated to other cryptocurrency forms, amounting roughly to $131,600. The company is planning to 'Hard Fork' the transaction network and blockchain, a measure that stops the cryptocurrency once and for all. Fortunately, the incident didn't have a hard effect on the price of NULS. The reason for the theft is said to be a vulnerability found in software version 2.2. The reason for having little effect on its value might be due to the value dropping down already at over 95%, follow...

122 Chinese Men Detained in Nepal on Charges of Cyber-crime and Bank Fraud

Image
KATHMANDU: Nepal police on Tuesday detained 122 Chinese men and women in what seems like the biggest crime gig by foreigners. A police officer, Hobindra Bogati, said the Chinese embassy was aware of the raids and have fully supported the detentions. The chief of police of capital Kathmandu stated that the suspects were raided on Monday when the police got info that some Chinese visa holding foreigners were engaged in suspicious activity. The police chief, Uttam Subedi said, “This is the first time that so many foreigners have been detained for suspected criminal activities." These people were suspected of various cyber crimes like hacking into bank cash machines and more. These 122 men and women are held in different police stations with their passports and laptops confiscated. Another police officer, Hobindra Bogati, told that the Chinese embassy in Nepal was aware of the raids and have fully supported the detentions. Chinese Foreign Ministry spokesman Geng Shuang, in Beijin...

90% of Russian entrepreneurs faced external cyber threats, says ESET

Image
The antivirus company ESET conducted a comprehensive study on the state of information security in Russian companies, interviewing dozens of IT Directors and business owners. According to the study, 90% of Russian companies faced external cyber threats and about 50% faced internal ones. Among external cyber threats spam (65%), malware (47%) and encryptors (35%) are leading. The distribution of malicious software is closely linked to the activity of spammers and phishers who seek to lull the employee's vigilance and force him to follow a malicious link or download a dangerous file. At the same time, many respondents noted that often viruses, Trojans and other malware got on devices because of the human factor - employees used unverified external drives or installed unwanted software. In addition, 7% of respondents experienced the loss of corporate smartphones, tablets or laptops with confidential information by employees. It is worth noting that specialists from the CIS oft...

7 Easy Habits to make you Digitally Secure!

Image
So 2019, was quite a year for hackers and security breaches. Countless malware, trojans, ransomware and data breaches attacked the business and financial sector leaving our security and information more exposed and feeble. And these hackers have moved from targeting the rich and high profile to the common people and the consequences can be right down scary. And that's why it becomes imperative that we protect ourselves from these attacks. It may seem like impossible feet but a few simple habits can go a long way to keep us cyber safe and cyber secure. Let's take a look- 1. Antivirus software  Leaving your computer exposed without any antivirus means you are gladly inviting virus and malware into your system. Installing an antivirus is the first line of defense and quite simple. Using anti-virus software is the foundation from which all your other online safety habits are built.  2.Thinking free means safe  Always be aware of freebies on the internet and cyberspac...

Russian hackers included in the US sanctions list may be associated with the criminal world

Image
Russian hackers from the group Evil Corp, which the British intelligence services call the most dangerous in the world, can be associated with crime, in particular, with the thief in law Vyacheslav Ivankov, better known as Yaponchik ("the little Japanese"). On December 9, it became known that Maxim Yakubets, the alleged leader of the group, was married to Alena Benderskaya, who is the daughter of Eduard Bendersky, a veteran of the FSB special forces Vympel. Journalists wrote that Benderskaya is the founder of companies associated with the security business of her father, as well as co-owner of two stores of the Italian brand Plein Sport. It's sportswear stores that Yakubets and his friends from Evil Corp liked to wear. According to the database, the share in these stores belongs to Otari Sadov. Journalists call him "the son of an authoritative businessman Leni Assiriysky, the right hand and nephew of Yaponchik." According to a source familiar with the ...

Latest "incorruptible" Privacy Method that makes your VPN Out-of-Date

Image
A unique chip that allows computers to send information using a 1-time 'indestructible' connection. "Experts have made a unique unhackable safety system that is bound to transform the information secrecy," says the University of St Andrews, King Abdullah University of Sciences and Technology (KAUST) and the Center for Unconventional Processes of Sciences (CUP Sciences). The global organization of experts has built a new optical chip that enables the message to be transmitted from the sender to another receiver using a 1-time untraceable transmission that can accomplish 'absolute privacy' as private information is secured as one of the safest means, thanks to the experts. The experts' designed method utilizes silicon chips that carry compact arrangements that are permanently modified to transfer data in a one-time-key that can't be formed again or hijacked by the hackers. A technology of the future-  While the present conventional encryption meth...

Company Behind Orcus Malware Fined by Canadian Broadcasting Agency

Image
Orcus Technologies, an organization that sold a remote access trojan (RAT) Orcus has been fined with 115,000 Canadian dollars (Approximately 87,000 US dollars). The fine was imposed by one of Canada's broadcasting agency, Canadian Radio-Television and Telecommunications Commission (CRTC). Orcus Technologies was established in March 2016 by founders John Paul Revesz (also known by the names, Ciriis McGraw, Armada Angelis, among other aliases) and a Germany-based man, Vincent Leo Griebel (also known as Sorzus). Griebel was responsible for developing the malware while Revesz looked after the marketing, sales and support section for the software. The idea behind the operations was to deliver a remote management tool just like widely used TeamViewer and various other remote management applications, as per the investigation carried out by the CRTC in association with the cybercrime division of the Royal Canadian Mounted Police (RCMP). "Proof got for the duration of the invest...

Russians learned to circumvent the ban on anonymity in the Network

Image
Russians learned to circumvent the ban on anonymity on the Internet using online services. Services give the customer a phone number for rent for a small amount for a few hours. Information security experts found that the requirement of mandatory identification of users of messengers by phone number provoked the growth of anonymous verification services. Such resources can be used to spread malicious software or other fraud. According to the technical Director of Qrator Labs Artem Gavrichenkov, such services provide users with mobile numbers for rent, among them, for example, sms-reg.com, getsms.online, smska.net, simsms.org and others. It costs from 3 to 300 rubles ($0.04 - 5), the rental period is from 20 minutes to several hours. Anonymous verification is available for Mail.ru, Vkontakte, Odnoklassniki, Avito, Yula, WhatsApp, Viber, Telegram, Facebook, Twitter, Yandex, Badoo, Mamba and others. According to the expert, mobile operators of different countries use services, bu...

Rise of the Ransomware Attacks Leads to an Increase Extortion Demands of Cyber Criminals

Image
As there happens a rise in the number of ransomware attacks doubled is the number of organizations surrendering to the extortion demands of cybercriminals in the wake of succumbing to such attacks particularly this year in contrast with the previous one. As indicated by figures in the recently released 2019 CrowdStrike Global; Security Attitude Security, the total number of organizations around the globe that pay the ransom subsequent to succumbing to a supply-chain attack has dramatically increased from 14% of victims to 39% of those influenced. While cybersecurity suppliers and law enforcements suggest that victims don't fund crime by surrendering to the blackmail requests/ extortion demands, at times organizations see it as the fastest and easiest method for re-establishing their networks. In the UK explicitly, the number of organizations that have encountered a ransomware attack and followed through on the demanded price for the decryption key stands at 28% – twofold t...

Hackers Continue to Dump Weak Ring Doorbell Credentials Online

The extensively marketed Ring smart devices are once again in hot water. Recently, numerous reports have surfaced online highlighting several Hackers Continue to Dump Weak Ring Doorbell Credentials Online on Latest Hacking News . from Latest Hacking News https://ift.tt/2QeTlC3

Russian quality system made recommendations for the safe use of IP cameras

Image
The Russian Quality System study says that wireless IP cameras that are used at home, in cafes and other public places can be hacked by attackers to obtain confidential data. The organization found that cameras have many vulnerabilities, as well as other devices that connect to the Network, for example, smart refrigerators, coffee makers. Specialists of the Russian quality system reported numerous cases in which personal data fall into the hands of hackers due to the hacked Wi-Fi cameras. Hackers can connect to the cameras of a cafe or restaurant and see the victim’s keyboard and their passwords. In addition, there was a case of hacking the casino’s Wi-Fi cameras when any person with sufficient technical skills could connect to them and observe the casino’s work from the inside, seeing people’s cards. The vulnerability of wireless cameras is associated with the quality of software that manufacturers save on and the lack of data encryption. In addition, cameras are often manage...

Researchers Uncovered Malware That Drops Six Variants in One Hit

Researchers have uncovered a new malware campaign which they dub the “Hornets Nest”. What makes this attack notable is the Researchers Uncovered Malware That Drops Six Variants in One Hit on Latest Hacking News . from Latest Hacking News https://ift.tt/2sQEoOS

Google Jazzes Up Its Patch Reward Program With Upfront Financial Support

Google has announced updates to its existing Patch Reward Program. Beginning in 2020, Google will provide upfront financial support to Google Jazzes Up Its Patch Reward Program With Upfront Financial Support on Latest Hacking News . from Latest Hacking News https://ift.tt/3777x7j

LifeLabs Disclosed Data Breach Impacting 15 Million Customers

Another cyberattack on the healthcare sector has put the privacy of millions of users at risk. Recently, a Canadian healthcare LifeLabs Disclosed Data Breach Impacting 15 Million Customers on Latest Hacking News . from Latest Hacking News https://ift.tt/34N7eN9

Attackers hacked a Spanish TV channel and showed an interview with the separatist leader of Catalonia

Image
Spanish state television company TVE on Wednesday said that last Thursday unknown attackers used an open portal on its website to air a Russia Today program about Catalan separatist leader Carles Puigdemont. According to the representative of TVE, hackers did not break into any external cybersecurity barriers but took advantage of the “open door” on the site. As the source noted, it is too early to talk about the identity and location of the attackers, since the investigation is not yet finished. The interview shown last Thursday was watched by about 96 users. Puigdemont and former Ecuadorian President Rafael Correa participated in a program produced by the Russian state channel.  In addition, in an interview, Puigdemont said that there is no option to resolve the problem of Catalonia, which would not include the independence of the region. It is interesting to note that both of them fled to Belgium after legal proceedings were initiated against them in their home count...

Businesses over Various Countries become Victims of Threat 'APT20'

Image
An Advanced Persistent Threat (APT) player expected to work from China from the last 2 years is silently targeting companies in the US and throughout the world in complete surveillance operations. Amongst its many targets are businesses in the flight, architecture, service, banking, health, transport businesses, and more, over 10 nations, including the United States, United Kingdom, Germany, China, and France. The threat is known as APT20, according to a report from Fox-It. "We say with great certainty that the threat is from a group from China and, it is probably supporting the interests of the Chinese government with stealing data for surveillance aim," says Fox-IT in a statement. Fox-IT's report of APT reveals that in a few events, the hackers gained primary entrance to a target's system through a weak Network. Usually, the servers by which APT20 gained access had already jeopardized in an unrelated earlier intervention and had Network pods put upon them. APT2...

Automotive Giant Honda Exposes 26,000 Vehicle Owner Records Containing Personally Identifiable Information of North American Customers

Image
Subsequent to misconfiguring an 'Elasticsearch cluster' on October 21, the multinational conglomerate Honda exposed around 26,000 vehicle owner records containing personally identifiable information (PII) of North American customers. Security Discovery researcher Bob Diachenko reached out to Honda's security team in Japan following which the team immediately verified the publicly accessible server within only a couple of hours. The database records incorporated the customers' full names, email addresses, phone numbers, mailing address, vehicle make and model, vehicle VINs, agreement ID, and various service information on their Honda vehicles, the company later included that none of its North American customers' financial information, credit card information, or credentials were uncovered in the episode. While the company responded instantly in the wake of being informed that the misconfigured Elasticsearch cluster was publicly accessible on the Internet, Di...

Update For Google Chrome 79 On Android Removed Due To Bug That Caused Data Loss

Not much time has passed since Google launched its Chrome browser version 79 with improved privacy and security features. However, Update For Google Chrome 79 On Android Removed Due To Bug That Caused Data Loss on Latest Hacking News . from Latest Hacking News https://ift.tt/2rhyDsT

Google Releases Chrome 79, Warns Users of Data Breach

Image
Tech giant Google has issued warning of data leak for Indian and global users, after fixing Chrome 79 bug and re-issuing it later this week. Users were being sent notifications by the company via affected websites– through the means of pop-up alerts that started to appear on desktops, mobile phone screens and laptop screens; it forced users into reading the text which said that their passwords may have been exposed and hence they should change it immediately – "Change your password. A data breach on a site or app exposed your password. Chrome recommends changing your password for the site," the warning pop-up read. As per sources, a bug affected data in select Android applications and Google had put on hold the release of Chrome 79. It was finally this week, Google's Chrome Releases blog confirmed the rollout of Chrome 79 for desktop and mobile platforms; Chrome 79 (79.0.3945.93) for Android comes with a fix for the WebView flaw and an assurance of improved defense ag...

Zeppelin Is Back! Ransomware Stealing Data Via Remote Management Software

Image
Hackers are employing remote management software to steal data and exploit networks only to install “Zeppelin” ransomware on compromised devices. Reportedly, “ConnectWise” is the name of the software that fabricates agents that are installed on target computers. Once the agent kicks off, the device appears on the ConnectWise Control Site management software. "ConnectWise" is a remote management software generally employed by MSPs and IP professionals to acquire access and render support to remote devices. The ransomware Zeppelin was recently per reports spread via “ScreenConnect” which is a desktop control tool basically in charge of remotely executing commands on a user’s device and managing it. The ScreenConnect client was installed on a compromised station leading to a massive real estate company’s network being jeopardized. The client that is named, ScreenConnect.ClientService.exe would run in the background undetected waiting all the while for a “remote man...

Insider Threat : Employees of Russian banks are massively recruited to get data

Image
In Russia, there are 73 services that recruit insiders in Russian banks. This information was shared by Darknet researcher Anton Staver. "Many groups providing such services is due to the amount of work that falls on them," explained Staver. According to the researcher, services that recruit Bank employees receive up to 50 orders a day, which is enough for the existence of an entire industry. The expert said that customers of such data are usually competitors of banks, jealous spouses of customers, as well as hackers and scammers. Scammers often asked to choose a list of victims with the big account balance. At the same time, according to Staver, recruitment is most often “carried out by specialized structures”. The expert noted that recruiters receive from customers about 15 thousand rubles ($240) for one employee of the Bank. During the work, the recruiter receives the search criteria, after which the client receives the contacts of the necessary person in Telegram...