Posts

Showing posts from August, 2020

A Brief Summary of The Potential Threats Revealed in Black Hat 2020 Conference

Image
Cybersecurity experts had a lot to say about possible cybersecurity threats in the USA Black Hat Conference. Main Highlights US Presidential Elections As the US awaits its presidential elections, cybersecurity has become a significant issue. In the conference, experts came out with various solutions to election-related cybersecurity threats that might arise during the campaigning and offered new ideas to strengthen the infrastructure. Exploits and Vulnerabilities  Cybersecurity expert Matt Vixey presented research on cybersecurity exploits. The main idea is that cyberattacks can only be prevented if there's a proper system involved; in other words, a plan-of-action. Here, the 'Human factor' risk is involved, and the hackers attack it. DNS Attacks  In recent times, DNS encryptions and its security have come into question. Hackers have come with a new way to breach the encryption; the technique is known as DOH (DNS-over-HTTPS). The key speaker for the topic was M...

Paytm Mall Suffers Data Breach, Hackers Demanded Ransom

Image
Paytm has allegedly suffered a huge data breach after a hacker group targeted the company's PayTM Mall database and demanded a ransom in return for the data.  The hacker group, dubbed as 'John Wick' and has been known for hacking the database of companies under the pretense of helping them fix bugs in their frameworks.  Global cyber intelligence agency Cyble stated that the John Wick hacker group had 'unhindered' access to Paytm Mall's whole production database through indirect access, which potentially influences all accounts and related info at Paytm Mall. An official update Cyble states, “According to the messages forwarded to us by our source, the perpetrator claimed the hack happened due to an insider at Paytm Mall. The claims, however, are unverified, but possible. Our sources also forwarded us the messages where the perpetrator also claimed they are receiving the ransom payment from the Paytm mall as well. Leaking data when failing to meet hacker...

United States Issues Alert on North Korean Threat Actors Finding Better Ways to Rob Banks

Image
The Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Treasury Department, the FBI, and U.S. Cyber Command issued a joint warning on August 26th, alerting that North Korean hackers have reopened their campaign of targeting banks across the globe by making fraudulent transactions and ATM cash-outs. The threat actors have made a systematic effort to attack financial institutions worldwide. They employ bold methods that do not guarantee a 100% success rate. However, these North Korean hackers have manipulated the ways in which some of the largest financial institutions interact with the international banking system. They dupe components of the system into making their hackers seem to be legitimate users; it allows them to transfer tens of millions of dollars into their accounts. As these hackers continually intruded into bank transaction records and log files, financial institutions were prompted to release security alerts and necessary upgrades to counter and henc...

The Ministry of Internal Affairs of Bashkortostan intends to cooperate with white hackers to reduce cyber crime

Image
The Ministry of Internal Affairs of Bashkortostan is ready to cooperate with white hackers and programmers to solve Internet crimes together with them. Law enforcement agencies want to attract volunteers-experts from among students-programmers to solve cybercrimes. According to Major General of Justice, Deputy Minister, Head of the Main Investigation Department of the Ministry of Internal Affairs of the Republic of Bashkortostan Oleg Oleinik, the regional department of the Ministry of Internal Affairs is working together with the Regional Center of the Volunteer Movement and the police already have experience in cooperation with young programmers. Recall that in the last two years, the number of cybercrimes in Bashkortostan has grown by almost 2.5 times: if in 2018, 2,500 cybercrimes were recorded, in 2019 – 6,300, then in the seven months of 2020, 6,500 cases have already been opened. Fraudsters use social engineering methods and debit money from cards of victims without any specia...

How a loyal employee saved Tesla from a Russian 1 million malware attack

Image
As Justin Richards said, "heroes can be found in the most unlikely places. Perhaps we all have it within us to do great things..." , this tale of extortion, bribing, and planned attack brings out how a loyal employee saved Tesla from a 1 million malware attack. In early August, an employee of Tesla was offered 1 million dollars to place an inside threat- a malware in Tesla's Newada factory; a conspiracy had it been successful could have cost the company millions.  According to the US Justice Department indictment Egor Igorevich Kriuchkov, a 27-year-old Russian came to the United States in July and started messaging an employee of the sustainable technology company whom he had met years earlier. The employee, a Russian emigrant, and Kriuchkov met at a Reno area bar, and that's where the idea for infiltrating Tesla's network was first pitched to the employee. He would get $500,000 to open a malicious email or 1 million cash or Bitcoin for the incursion of ma...

Telegram Data Leak Exposes Millions of Records on Darknet

Encrypted-messaging app Telegram suffered a massive data leak that exposed the personal data of millions of users. A rival to Telegram Data Leak Exposes Millions of Records on Darknet on Latest Hacking News . from Latest Hacking News https://ift.tt/34HiQoE

A Quick Guide to Digital Tourism and Destination Marketing

Human beings have always loved traveling and exploring new places. What started off as a nomadic lifetime has over generations A Quick Guide to Digital Tourism and Destination Marketing on Latest Hacking News . from Latest Hacking News https://ift.tt/3joq70x

Nefilim Ransomware Evolving Rapidly: Top Targets at a Glance

Image
Ransomware has continually expanded both in terms of threat and reach as threat actors continue to devise fresh methods of introducing new ransomware variants and malware families. One such newly emerged ransomware that was first identified at the end of February 2020, Nefilim, threatens to release victims’ encrypted data if they are unable to pay the ransom. With a striking code resemblance to that of Nemty 2.5 revenge ransomware, Nefilim is most likely to be distributed via exposed Remote Desktop Protocol, according to Vitali Kremez, an ethical hacker at SentinelLabs. Earlier this month, researchers from threat intelligence firm Cyble, discovered a post by the authors of Nefilim ransomware, claiming to have hacked The SPIE Group, an independent European market leader for technical services in the fields of energy. As per the claims made by the operators in the post, they are in the possession of around 11.5 GB of company’s sensitive data that include corporate operational docume...

The data of 55 thousand clients of Russian banks were publicly available

Image
 The Bank of Russia and the Visa payment system have notified credit institutions about the leakage of bank customer card data. The database with the data of 55 thousand users of the Joom marketplace, specializing in the delivery of goods from China, was publicly available.  - The database was available for free download on the Darknet and in Telegram channels last week. It contained the first six and last four digits of the card number, its expiration date, the payment system and the Bank that issued the card, as well as the user's full name, phone number, email address and residential address. A representative of the company said that the leak occurred back in March. The company has terminated cooperation with the counterparty due to which the incident occurred. It is noted that only those banks whose cards were used by customers from the database received messages from a center for monitoring and responding to computer attacks in the credit and financial sector (FinCER...

APT36: A Pakistani Hacking Group, Strengthens Its Operations and Finds New Targets

Image
Famous as APT36, Transparent Tribe is a hacking group that works from Pakistan. APT36 is infamous for monitoring and spying over government activities and military operations in Afghanistan and India. As per the latest reports, APT36 has now strengthened its workforce with better tools and strategies About the incident  APT36 usually focuses on using the same TTP (tactics, techniques, and procedures) except in a few cases where it uses different strategies for unique programs. Some key highlights- According to the reports, APT36 has sharpened its tools and activities. It involves attacking campaigns on a much larger scale and specifically targeting Afghanistan.  Usually, APT36 uses 'custom.net' malware, commonly known as 'crimson rat.' APT36 has been using other malware recently, including python-based 'Peppy rat.'  In the period between June2019-June2020, 200 samples were collected, which showed the Transparent Tribe Commission's components.  ...

The new iOS 14 to drop Facebook's Audience Network Advertising to 50%

Image
Facebook on Wednesday posted a response to the new iOS 14 on their official blog stating that the new iOS could lead to a 50% drop in their Audience Network advertising business. Though the company had previously raised issues with iOS 14 and that it could impact their advertising, this Wednesday blog detailed exactly how.  Facebook Audience Network collects data from the user ( Facebook's data) and provides targeted in-app advertisements. Advertisers use a unique device ID number known as the IDFA in order to make advertisements personalized.  In iOS 14, these tracking IDFA would be made optional and the user can opt if they want their app to track or not. Facebook said they won't collect IDFA information in iOS 14 at all even though it will make a significant dent in their audience network advertising.  "We know this may severely impact publishers' ability to monetize through Audience Network on iOS 14, and, despite our best efforts, may render Audience N...

NZ Stock Exchange Halted Temporarily Twice After Being Hit by Cyber Attacks

Image
The New Zealand stock exchange was hit by a cyber-attack due to which it had to remain offline two days in a row. The exchange said the attack had "impacted NZX network connectivity" and it had chosen to temporarily halt trading in cash markets not long before 16:00 local time. The trading had to be stopped briefly for a second time, yet was back ready for action before the day's end.  A DDoS attack is generally a quite straightforward kind of cyber-attack, wherein a huge 'array' of computers all attempt to connect with an online service at the same time usually resulting in 'overwhelming its capacity'.  They frequently use devices undermined by malware, which the owners don't know are a part of the attack.  While genuine traders may have had issues with carrying out their business, but it doesn't mean any financial or personal data was accessed. NZX said the attack had come “from offshore via its network service provider".  The s...

Russian citizen arrested in the United States on charges of organizing a cyber crime

Image
According to the Ministry of Justice, 27-year-old Yegor Kryuchkov tried to pay $1 million to an employee of a company from Nevada in order to introduce malware into its computer network. When the FBI joined the investigation, the Russian tried to run from the United States A Federal Court in Los Angeles has arrested a Russian citizen, Yegor Kryuchkov, on charges of conspiring to commit cybercrime. This was reported by the press service of the US Department of Justice. According to the Department, 27-year-old Kryuchkov in the period from July 15 to August 22 this year tried to bribe an employee of an unnamed American company located in the state of Nevada. The statement claims that the Russian offered him $1 million for participation in the implementation of the fraudulent scheme. The Ministry of Justice reported that Kryuchkov allegedly planned to load malicious software into the computer system of this company. This would allow him and his associates to gain unhindered access to ...

How to Keep Your VPS Based Project Secured

The issue of VPS security is a topic of concern, even for established website owners. As a novice, remember that How to Keep Your VPS Based Project Secured on Latest Hacking News . from Latest Hacking News https://ift.tt/34BEXwy

Google Patched Serious Code Execution Bug With Chrome 85

Google has recently released the stable version of Chrome 85 with numerous updates and a serious bug fix. Exploiting this Google Patched Serious Code Execution Bug With Chrome 85 on Latest Hacking News . from Latest Hacking News https://ift.tt/2G2jDpY

Experts identified flaw that allows criminals to steal money using Faster Payments System (FPS)

Image
Experts have identified a flaw that allows criminals to steal money from accounts of clients of banks through the Faster Payments System (FPS),  which is often opposed to the idea of a crypto-ruble. The experts found out that when the function of transfers via the FPS in the mobile bank was activated, one of the credit institutions was left vulnerable. Fraudsters were able to take advantage of this error and get customer account data. Then the attackers launched the mobile bank in debug mode,  logged in as real clients, and sent a request to transfer funds to another bank, only instead of their account they indicated the account number of another client for debiting. Since the system does not verify the ownership of the account, it debited the money and transferred it to the fraudsters. According to market participants, this is the first case of theft of funds using the FPS. The vulnerability could only be known by someone familiar with the application: an employee or dev...

FBI Arrests Russian Hacker, Who Tried To Convince An Employee to Hack His Nevada Company

Image
A hacker from Russia went to America and asked an employee of a Nevada company to install a malware in their company network.  In a recent incident, the U.S Department of Justice declared charges against a Russian hacker today. The Russian national had traveled all the way to America to ask an American employee if he could set up malware, offering him $1,000,000 for the job. As per the court's reports today, the culprit, a 27-year-old hacker from Russia, named Egor Igorevich Kriuchkov, is found as a criminal member of an infamous Russian hacking group. The purpose of the attack was to gain internal access to the company's network and hack confidential information, later to be used as extortion for ransom purposes. According to the company employee, Igor told him that to prevent the company from knowing about the primary attack, his team of hackers would launch DDoS attacks as a decoy to distract the corporate."The purpose of the conspiracy was to recruit an employee ...

10 Most Effective E-Commerce Fraud Detection Tools in 2020

Introduction to E-commerce fraud prevention tools Today the E-Commerce industry is on the rise. With the unfortunate situation with the 10 Most Effective E-Commerce Fraud Detection Tools in 2020 on Latest Hacking News . from Latest Hacking News https://ift.tt/32sBIVx

The Ins and Outs of RPA Technology

Introduction With Microsoft eyeing up to purchase firms specializing in Robotic Processes Automation (RPA), the industry’s promise as well as more mainstream The Ins and Outs of RPA Technology on Latest Hacking News . from Latest Hacking News https://ift.tt/31ArS53

Over 500 SSH Servers being Breached by FritzFrog P2P Botnet

Image
Cyberspace has seen an unprecedented rise in modified versions of peer-to peer, also known as (P2P) threats, it might have appeared that these P2P services have been vanishing, but in reality, they have emerged even stronger in newer ways. BitTorrent and eMule are still known to be in use by attackers. A peer-to-peer (P2P) network is an IT infrastructure in which two or more computers have agreed to share resources such as storage, bandwidth and processing power with one another. Besides file sharing, it also allows access to devices like printers without going through separate server software. A P2P network is not to be confused with client-server network that users have traditionally used in networking, here, the client does not contribute resources to the network. Researchers at Guardicore have recently discovered a sophisticated peer-to-peer (P2P) botnet called as FritzFrog that has been actively operated since January 2020, breaching SSH servers; it’s a Golang-based modula...

Managing the Insider Threat of Remote Workers

Remote work has become increasingly common in the wake of COVID-19. The need for employees to stay home from the Managing the Insider Threat of Remote Workers on Latest Hacking News . from Latest Hacking News https://ift.tt/3grN4ON

Best Bitcoin Practice for New Users

Bitcoin Bitcoin is a cryptocurrency, form of digital currency. It is not an official government currency nor any other banks. Best Bitcoin Practice for New Users on Latest Hacking News . from Latest Hacking News https://ift.tt/2EAKKaY

Bitcoin vs. Other Cryptocurrencies

Bitcoin is a digital currency also knows as crypto-currency, which was created to facilitate and speed-up transactions across borders. This Bitcoin vs. Other Cryptocurrencies on Latest Hacking News . from Latest Hacking News https://ift.tt/3hHpCy8

Safari Bug That Allows Stealing Data Disclosed After Apple Delays A Patch

A researcher has recently disclosed a bug publicly that affects the Safari browser after Apple attempted to delay the fix. Safari Bug That Allows Stealing Data Disclosed After Apple Delays A Patch on Latest Hacking News . from Latest Hacking News https://ift.tt/3b5oG4s

Carnival Corporation Cruise Operator Suffered Ransomware Attack

The world’s largest cruise operator Carnival Corporation has reported a security incident. As revealed, Carnival suffered a ransomware attack that Carnival Corporation Cruise Operator Suffered Ransomware Attack on Latest Hacking News . from Latest Hacking News https://ift.tt/2YzWPEp

Microsoft's new report suggest a rapid transformation in cyber security due to the pandemic

Image
 In just two months of the pandemic, the digital world went through "two years worth of digital transformation" according to Microsoft and to compute these changes the company did a survey of 800 leaders from companies with more than 500 employees from the United States, United Kingdom, India, and Germany. The report circumcises the pandemic threat landscape, the long term cybersecurity, budget, staffing, and the adjustments companies did to update their security. The crux of the matter remains that the pandemic bought on a  multitude of attacks and scams but the very thing strengthened the need for better cybersecurity and many businesses realized this and overall we saw a grave change where digital security is concerned. According to Microsoft's report following are the changes bought on in cybersecurity by the global pandemic in the long term- Security as a prime factor in Digital Empathy With scales of business going WFH (work from home), business leaders quic...

The Russian quality system (Roskachestvo) reported on the new traps of scams in WhatsApp

Image
The absolute majority of fraud in WhatsApp occurs through social engineering when the text prompts the user to click on a link or download a file, said Ilya Loevsky, deputy head of Roskachestvo. So, criminals often make mass mailings with various profitable offers or lotteries to encourage the user to participate and click on an infected link or download a suspicious file. "As a rule, hackers use big names of companies, such as Google, Apple, Facebook, hot topics like COVID-19, or super-profitable offers (last year it was a "promotion" about 1000 free gigabytes of the Internet for the 10th anniversary of the service). Fraudsters often fake official WhatsApp profiles by copying the name and design,” the expert gives examples. According to the expert, sending such messages to your contacts is undesirable, as it only contributes to the spread of fraud. However, after clicking on a malicious link, anything can happen to the victim, from stealing personal data to withdraw...

Numerous Vulnerabilities Found In Discount Rules for WooCommerce Plugin

Recently, the Discount Rules for WooCommerce Plugin has made it to the news owing to multiple vulnerabilities. Exploiting these flaws Numerous Vulnerabilities Found In Discount Rules for WooCommerce Plugin on Latest Hacking News . from Latest Hacking News https://ift.tt/3aTiV9T

University Of Utah Suffered Ransomware Attack – Paid Ransom To Recover

As ransomware attacks continue to target the educational sector, the University of Utah has emerged as the recent victim to University Of Utah Suffered Ransomware Attack – Paid Ransom To Recover on Latest Hacking News . from Latest Hacking News https://ift.tt/2CV3NMu

Google Drive Vulnerability Allows Spearphishing Attacks

A serious vulnerability exists in Google Drive that still awaits a fix. As discovered, the vulnerability allows an adversary to Google Drive Vulnerability Allows Spearphishing Attacks on Latest Hacking News . from Latest Hacking News https://ift.tt/3gstWA6

TikTok Files Lawsuit Against the U.S. Government Over Ban of Its Application

Image
Tiktok has confirmed that it is going to sue the U.S. government for banning the use of Tiktok application in the United States. However, the Lawsuit will not ensure the Chinese company's future in the U.S. market even if it wins. The company claims that it has been trying to agree with Donald Trump administration's concerns and has been trying to reach a consensus for one year. Instead of entering a general agreement, the U.S. government is not paying attention to this issue, says TikTok. According to the company, the administration is not willing to offer any opportunities to resolve the problems. Reuter reports, "it was not immediately clear which court TikTok plans to file its lawsuit. The company had previously said it was exploring its legal options, and its employees were also preparing their own lawsuit. While TikTok is best known for its anodyne videos of people dancing and going viral among teenagers, U.S. officials have expressed concerns that information o...

Google Fixed A Gmail Vulnerability Just 7 hours From Public Disclosure

A serious spoofing vulnerability affected Google’s Gmail service. However, despite discovery and responsible disclosure, the tech giant delivered the fix Google Fixed A Gmail Vulnerability Just 7 hours From Public Disclosure on Latest Hacking News . from Latest Hacking News https://ift.tt/34om28B

FireEye Bug Bounty Program Now Available To The Public

Taking another step towards security, the cybersecurity firm FireEye has publicly launched its bug bounty program. While the program initially FireEye Bug Bounty Program Now Available To The Public on Latest Hacking News . from Latest Hacking News https://ift.tt/2QiGD63

Here's how to Ensure Data Security Using FShred App

Image
Users are well aware of the fact that while deleting photos, videos, files, or any other form of data on their Android, it doesn't get deleted in an irrecoverable manner and can be recovered in a number of ways using recovery tools. Although regaining access to a deleted file might be rewarding in many scenarios, the rest of the time users would prefer a once and for all deletion of the same to ensure data safety. In the sphere of Data security, continually rising unwanted activities of unauthorized users call for the creation of something that can protect users against data breaches and cyberattacks destroying their sensitive data. Users need their data to be erased in a manner that no recovery tool can undo it. How can it be done? When users have no intention to retrieve their deleted data by any means, data eraser apps come into play. These apps help users delete their sensitive data in ways that make it irrevocable from their Android devices. It proves to be of signifi...

Uber's Former Chief Security Officer Charged for Covering up A Massive Data Breach

Image
Uber's former chief security officer, Joe Sullivan, was very recently charged by the federal prosecutors in the United States for covering up an enormous data breach that the company had endured in 2016. Sullivan "took deliberate steps to conceal, deflect, and mislead the Federal Trade Commission about the breach" that additionally included paying hackers $100,000 ransom to keep the incident a secret, according to the press release published by the U.S. Department of Justice.  It said, "A criminal complaint was filed today in federal court charging Joseph Sullivan with obstruction of justice and misprision of a felony in connection with the attempted cover-up of the 2016 hack of Uber Technologies.”  The 2016 Uber's data breach exposed names, email addresses, phone numbers of 57 million Uber riders and drivers, and driving license numbers of around 600,000 drivers.  The company revealed this data out in the open almost a year later in 2017, following Sul...

Konica Minolta Attacked By A New Ransomware

Japanese technology giant Konica Minolta has now fallen prey to a cyber attack. Konica Minolta has suffered a ransomware attack, Konica Minolta Attacked By A New Ransomware on Latest Hacking News . from Latest Hacking News https://ift.tt/3hmdFOz

Russian media reported on fake domains for pre-ordering coronavirus vaccine

Image
After the Russian Ministry of Health registered the first coronavirus vaccine, the number of new domains associated with the vaccine increased on the Internet. Creating a phishing site takes three to four hours thanks to designers and illegal CDNs, and earnings from them can range from thousands of dollars and much more depending on the audience and period, said Andrey Zaikin, head of the Information Security department at CROC IT company. In the ten days since the vaccine was registered, 113 related domains appeared in the .com and .ru zones, said Eugene Voloshin, Director of the cybersecurity company Bi.Zone. Infosecurity a Softline Company adds that in July-August 2020, 445 domains were registered, which is about nine per day. Such sites started appearing in March. They offered to buy a non-existent vaccine and medication for coronavirus. One resource in English offered to pre-order a vaccine in the amount of 10,000 to 1 million doses and pay a quarter of the cost of the batch,...

Spikey Attack Can Duplicate Physical Keys By Listening To Click Sounds

Researchers have come up with a new attack that creates 3D-printed physical keys. Dubbed Spikey, the technique involves listening to Spikey Attack Can Duplicate Physical Keys By Listening To Click Sounds on Latest Hacking News . from Latest Hacking News https://ift.tt/3l3lJpw

Cisco Patched Critical Vulnerability In Cisco vWAAS

Cisco has recently addressed a serious vulnerability affecting its  vWAAS product. Exploiting the bug could give admin rights to an Cisco Patched Critical Vulnerability In Cisco vWAAS on Latest Hacking News . from Latest Hacking News https://ift.tt/3hiuvxF

Hackers Can Now Clone Your Key Using Just a Smartphone Microphone and a Program

Image
  Earlier this year researchers at the National University of Singapore came up and published a paper enumerating how, utilizing just a smartphone microphone and a program designed by them, a hacker can clone your key. The key, named SpiKey, is the sound made by the lock pins as they move over a typical key's edges.  The paper written by Soundarya Ramesh, Harini Ramprasad, and Jun Han, says that “When a victim inserts a key into the door lock, an attacker walking by records the sound with a smartphone microphone."  And with that recording alone, the hacker/thief can utilize the time between the audible clicks to determine the distance between the edges along with the key.  Utilizing this info, a 'bad actor' could then figure out and afterward come up with a series of likely keys.   So now, rather than messing around with lock-picking tools, a thief could basically attempt a few pre-made keys and afterward come directly in through the victim's do...

More than 100 websites selling air tickets in Russia turned out to be fraudulent

Image
Cybercriminals continue to deceive people. According to the Group-IB, over the past few months, more than 100 fraudulent sites in the field of online ticket sales have appeared on the Network. If in July there were about 30 such pages, in August there were about 100, said Yakov Kravtsov, head of the anti-counterfeit department of the company's brand protection department. "The last one and a half to two months there has been a boom in the creation of phishing and fraudulent resources related to ticket sales,” said Mr. Kravtsov. He noted that most of these portals are dedicated to selling air tickets. There are also websites where it’s possible to book hotels and rent cars. Criminals use these sites to get people's card data and money. Most of these resources are currently blocked, but you still need to be careful. According to Kravtsov, fraudsters often take the brands of well-known aggregators for ticket sales or act under the name of large air carriers. "Some ...

10 Tips to Protect Your Company Website From Hackers

You’ve spent hundreds if not thousands of dollars perfecting your website. It looks good and your customers and clients also 10 Tips to Protect Your Company Website From Hackers on Latest Hacking News . from Latest Hacking News https://ift.tt/3hsSKcJ

Expert Malnev gave tips on detecting Keylogger

Image
Alexey Malnev, head of the Jet CSIRT Information Security Monitoring and Incident Response Center of Jet Infosystems, spoke about how to detect a Keylogger. According to the expert, this can be done by scanning the computer with antivirus software, as well as thanks to the built-in EDR (Endpoint Detection and Response) system that analyzes the processes and their memory operation within the operating system. In the case of corporate devices, a traffic inspection system will help, which can detect a connection over a suspicious Protocol or to a suspicious server on the Internet. The presence of an incident monitoring center in an organization can help detect an entire cyber operation of attackers on its infrastructure, or targeted attacks. According to the expert, the presence of Keylogger can be considered a symptom of a complete hacking of the user's computer, and this is very bad news for the user. The fact is that modern malicious software most often uses Keylogger as one of...

REvil/Sodinokibi Ransomware Specifically Targeting Food and Beverages Organizations

Image
REvil, also known as Sodinokibi ransomware was first spotted in April 2019, it attacks Windows PCs to encrypt all the files on local drives (besides those enlisted in their configuration file) and leaves a ransom note on affected systems with instructions to get the files decrypted in turn of the demanded ransom. It shares a similar code as GandCrab ransomware and is said to be distributed by the authors of the aforementioned ransomware which saw a steep decline in its activity with the arrival of REvil. The claim regarding similarity was based on observations made by experts that point towards an identical set of techniques used in attacks, similar countries targeted, and the language. The ransomware strain exploits an Oracle WebLogic vulnerability to elevate privileges and in order to generate and propagate encryption keys; REvil makes use of an Elliptic-curve Diffie Hellman key exchange algorithm. Let’s take a look at its latest activities. As per sources, the ransomware tries...

Telegram Launched Video Calls For Both iOS And Android

Following the COVID-19 pandemic scenario, Telegram has taken an important step that may serve as an alternate to Zoom. Many Telegram Launched Video Calls For Both iOS And Android on Latest Hacking News . from Latest Hacking News https://ift.tt/3hg8xv4

US Army Says North Korea Has Hackers and Electronic Warfare Specialists Working and Operating Abroad

Image
In a report published a month ago by the US Army said North Korea has at least 6,000 hackers and electronic warfare specialists working in its ranks with a large number of these are operating in nations, like Belarus, China, India, Malaysia, and Russia.  The report is a tactical manual that the US Army uses to train their troops and military pioneers, and which the Army has made public for the first time just the previous month.  Named "North Korean Tactics," the 332-page report consists of a 'treasure trove' of data about the Korean People's Army (KPA) like the military strategies, weaponry, leadership structure, troop types, logistics, and electronic warfare capacities.  By far most of the report manages exemplary military tactics and capacities; the report likewise highlights North Korea's clandestine hacking units. "Most EW [electronic warfare] and cyberspace warfare operations take place within the Cyber Warfare Guidance Unit, more commonly kn...

How to Shop Online Safely

Online shopping makes our lives easier. COVID-19 has caused its popularity to surge. These days, consumers prefer to do everything How to Shop Online Safely on Latest Hacking News . from Latest Hacking News https://ift.tt/2EeWIXE

Instagram Retained Users Data Even After Deletion – Bug Fixed

A researcher found a serious “bug” in the Instagram platform that violated users’ privacy. Briefly, he found that Instagram retained Instagram Retained Users Data Even After Deletion – Bug Fixed on Latest Hacking News . from Latest Hacking News https://ift.tt/3kSbR1I

Bangaluru based startup Pixxel raises $5 Million to be India's first Earth-Imaging Satellite to launch

Image
A Bengaluru based startup, Pixxel is soaring towards the moon as they recently raised a sweeping fund of 5 million dollars for their new technology for earth imaging. The funding was provided by Blume Ventures, Lightspeed India Partners, and grows ventures and other investors. The two young founders Awais Ahmed and Kshitij Khandelwal with their innovative tech will change the way for earth imaging forever. The company's goal is to surround the earth with a constellation of 30 small imaging satellites that will provide constant global coverage. Their satellites are quite small in size but provide high-quality imaging data that existing satellites fail to do. This 24-hour global coverage, they (Pixxel) hope will help to analyze the weather, predict and track natural phenomena in real time, and more. Their first satellite is set to be launched later this year on a Soyuz Rocket and further, they plan to complete their constellation of 30 satellites by 2022. The founders were work...

Russians were warned about phishing emails on behalf of the tax service

Image
Experts of the company Group-IB, specializing in the prevention of cyberattacks, together with the Federal Tax Service (FTS), identified the activity of fraudsters in the Network. Criminals send emails to legal entities and state institutions allegedly on behalf of the tax authorities. All emails of attackers looked the same. They said that the recipient must appear at the Federal Tax Service to "give evidence about the flow of funds”. Before visiting the institution, the recipient of the letter was required to fill out a special form, which was attached in the letter as an archive with a password. The password was also attached in the email. This scheme allowed bypassing antivirus protection. When the archive was opened, a program for remote access to it was installed on the user's computer. "The Federal Tax Service of Russia does not send letters to taxpayers about the existence of debt and offers to pay the debt online,” reported the press service of the FTS. The m...