Posts

Showing posts from March, 2021

MobiKwik Suffered Data Breach – 3.5M Customers’ Data Uploaded to Dark Web

An Indian mobile payment giant MobiKwik has made it to the news in the wake… MobiKwik Suffered Data Breach – 3.5M Customers’ Data Uploaded to Dark Web on Latest Hacking News . from Latest Hacking News https://ift.tt/3wcV0wh

Two Linux Vulnerabilities Could Allow Bypassing Spectre Attack Mitigations

While mitigations are in place to protect Linux systems from Spectre attacks, newly discovered vulnerabilities… Two Linux Vulnerabilities Could Allow Bypassing Spectre Attack Mitigations on Latest Hacking News . from Latest Hacking News https://ift.tt/3fw991Q

Here's How to Safeguard Against Mobikwik Data Breach

Image
  Cybersecurity researchers claimed that the KYC data of as many as 11 crores Mobikwik users had been leaked and put up for sale on the dark web. However, the Gurugram-based digital wallet company is denying the data breach by stating that they have not discovered any evidence of a data leak. Rajshekhar Rajaharia, an independent cyber-security researcher was the first person who disclosed the data leak in February. He had said that bank details, email addresses, and other sensitive details of nearly 11 crore Indians were leaked on the dark web.  Approximately, 8 terabytes (TB) of personal user information were stolen from Mobikwik’s main server by a hacker named ‘Jordan Daven’ and put on dark web platforms on January 20, Rajaharia stated. As a shred of evidence, Jordan Devan emailed the link of the stolen database to PTI and stated that they do not have any other motive of using the data except to acquire it from the company and delete it from their end and also shared t...

5G Network Slicing Vulnerabilities Risk DoS, Location Tracking, Data Theft, and Other Threats

Researchers have found some serious vulnerabilities in 5G network slicing and virtualization technology. Exploiting these… 5G Network Slicing Vulnerabilities Risk DoS, Location Tracking, Data Theft, and Other Threats on Latest Hacking News . from Latest Hacking News https://ift.tt/3rI8UCZ

Top 4 Reasons Why Network Security Is Critical for Businesses

Cybersecurity has been a primary concern for businesses worldwide for several years now. However, with… Top 4 Reasons Why Network Security Is Critical for Businesses on Latest Hacking News . from Latest Hacking News https://ift.tt/39wiz9z

6 Benefits Of GPS Tracking Cameras

GPS tracking systems have been evolving over a good time. Business owners or even common… 6 Benefits Of GPS Tracking Cameras on Latest Hacking News . from Latest Hacking News https://ift.tt/39uyPIg

Useful Tips for Choosing the Right 3D Printer

3D printers are very versatile pieces of newly developed equipment. They can be used to… Useful Tips for Choosing the Right 3D Printer on Latest Hacking News . from Latest Hacking News https://ift.tt/2PeVT76

Mobikwik Data Leak of 10cr Users: ‘The Largest KYC Data Leak in History’

Image
  According to cybersecurity researcher Rajshekahar Rajaharia, mobile payment app Mobikwik came under attack after the data of 10 crores of its users was posted for sale on a hacker website on the dark web. The alleged data breach was conducted by a group of hackers known as the ‘Ninja Storm,' who have also been selling the ‘leaked' details online since March 26.  The data is being sold for 1.5 Bitcoins, which is nearly Rs 63 lakhs, as per a post by the hacker community. Ever since tens of thousands of people have taken to Twitter to share screenshots of their personal information being exposed. It is the ‘largest KYC data leak in history,' according to cybersecurity researcher Elliot Laderson.  Personal information of merchants who obtained loans via Mobikwik is also said to be available for purchase in exchange for bitcoins. Over 4 crore Mobikwik customers' card details and hashes are reportedly included in the leak.  The Gurugram-based fintech firm has mai...

Serious Vulnerability In Netmask npm Package Risked 270K+ Projects

A serious vulnerability existed in the Netmask npm package that could allow server-side request forgery.… Serious Vulnerability In Netmask npm Package Risked 270K+ Projects on Latest Hacking News . from Latest Hacking News https://ift.tt/3sFol03

MIDC’s Server Hacked, Threat to Destroy Data

Image
  The server of Maharashtra Industrial Development Corporation was hacked as of late. The ransomware 'SYNack' affected the applications and database servers facilitated at the MIDC headquarters in Mumbai by encrypting the information put away in these servers. Hackers have demanded Rs 500 crore, they have mailed a demand of Rs 500 crore on MIDC's official mail ID, sources said.  The malware additionally tainted some desktop PCs across various office areas of the MIDC. The assailants had attached a ransom note giving details of the assault and the steps needed to be taken to approach them for decryption of information. Nonetheless, no sum was directly referenced in the ransom note, a statement given by the MIDC expressed. After the hack, every one of the 16 regional workplaces in the state, including the head office in Mumbai, has been shut down.  The total data of all the industrial estates, entrepreneurs, government elements, and different plans identified with MIDC...

Harris Federation Education Charity Suffered Ransomware Attack

London-based education trust Harris Federation appears the latest victim of a ransomware attack. The incident… Harris Federation Education Charity Suffered Ransomware Attack on Latest Hacking News . from Latest Hacking News https://ift.tt/3u6JWyT

278,000 GitHub Repositories Affected by a Critical Networking Flaw in Netmask

Image
  Security researchers have unearthed a critical networking flaw CVE-2021-28918 in a popular npm library netmask. Netmask is commonly utilized by tons of thousands of applications to analyze IPv4 addresses and CIDR blocks or compare them.  Netmask usually gets over 3 million weekly downloads, and as of today, has scored over 238 million complete downloads over its lifetime. Apart from this, nearly 278,000 GitHub repositories depend on the netmask. Due to improper input validation flaw, netmask sees a different IP and this flaw could allow hackers to achieve server-side request forgery (SSRF) in downstream applications.  Security researchers Victor Viale, Sick Codes, Nick Sahler, Kelly Kaoudis, and John Jackson were responsible for tracking down the vulnerability in the popular netmask library. The flaw was initially detected when security researchers including Codes were designing a patch for a separate, critical, SSRF flaw (CVE-2020-28360) in downstream package Pri...

How Pandemic-Driven Tech Trends are Changing the Labor Market for Good

The year 2020 will be remembered for many things. Among them will be a global… How Pandemic-Driven Tech Trends are Changing the Labor Market for Good on Latest Hacking News . from Latest Hacking News https://ift.tt/31uauhr

Backdoor In PHP Source Code Discovered

Unidentified attackers recently hacked the PHP Git server to inject the source code with a… Backdoor In PHP Source Code Discovered on Latest Hacking News . from Latest Hacking News https://ift.tt/3m3ZtNa

Live Broadcast Got Disrupted Due to Cyber-Attack on The Australian Tv Network- Nine

Image
  A cyber-attack on Australia's Channel Nine TV network has interrupted live broadcasts, raising questions about the country's exposure to hackers. ‘Weekend Today’, the broadcaster's Sunday morning news program that broadcasts from 7:00 a.m. to 1:00 p.m. from its Sydney headquarters, was also unable to air. In addition, the network's 5:00 p.m. newscast was also not broadcasted in Melbourne.  The hack was being investigated as "criminal sabotage or the work of a foreign nation," according to Nine. On Sunday, Australia's parliament was looking into a potential cyber-attack in Canberra. Entry to IT and emails at Parliament House has been restricted as a precaution, according to Assistant Defense Minister Andrew Hastie.  “We wish to inform you there has been a cyber-attack on our systems which has disrupted live broadcasts out of Nine Sydney,” reads an email sent by the company to staff. “Our IT teams are working around the clock to fully restore our sys...

PHP Git Server Hacked to Plant Malware in Code Base

Image
  In the most recent software supply chain assault, the official PHP Git repository was hacked and the code base altered. On Sunday, two malevolent commits were pushed to the php-src Git repository kept up by the PHP team on their git.php.net server. The threat actors had signed off on these commits as though these were made by known PHP developers and maintainers, Rasmus Lerdorf and Nikita Popov.  The incident is disturbing considering PHP stays the server-side programming language to control more than 79% of the sites on the Internet. In the noxious commits [1, 2] seen by BleepingComputer, the assailants published a strange change upstream, "fix typo" under the pretence this was a minor typographical amendment.  As indicated by Bleeping Computer, the code has all the earmarks of being intended to embed a backdoor and make a situation wherein remote code execution (RCE) might be conceivable. Popov said the development team isn't sure precisely how the assault occurr...

FatFace Disclosed Data Breach; Turns Out It Suffered Ransomware Attack

While ransomware attacks are becoming common, still not every victim firm knows how to deal… FatFace Disclosed Data Breach; Turns Out It Suffered Ransomware Attack on Latest Hacking News . from Latest Hacking News https://ift.tt/3sz4IqD

Researcher Patented C2FIV Technology As 2FA For Face Recognition Via Facial Movements

Face recognition is one of the modern biometric authentication methods used for various security purposes.… Researcher Patented C2FIV Technology As 2FA For Face Recognition Via Facial Movements on Latest Hacking News . from Latest Hacking News https://ift.tt/3fqblYs

Malicious System Update App Targets Android Users With Malware

Android users are now facing a new malware threatening their personal information. The new Android… Malicious System Update App Targets Android Users With Malware on Latest Hacking News . from Latest Hacking News https://ift.tt/3dek90Z

SAAS & Security – Best Practices For Businesses

Software as a Service (SAAS) has revolutionised the way we do business. Moving data and… SAAS & Security – Best Practices For Businesses on Latest Hacking News . from Latest Hacking News https://ift.tt/3fsldB0

Insurance Giant CNA Went Offline Following A Ransomware Attack

The latest victim of a ransomware attack is the American insurance giant CNA Financial. The… Insurance Giant CNA Went Offline Following A Ransomware Attack on Latest Hacking News . from Latest Hacking News https://ift.tt/3rzzChl

Top Security Tips That Every Business Owner Must Know

In this day and age, one can never be too safe. Businesses now need to… Top Security Tips That Every Business Owner Must Know on Latest Hacking News . from Latest Hacking News https://ift.tt/3flpzde

Beware of Ongoing Brute-Force Attacks Against NAS Devices, QNAP Warns

Image
  Taiwanese firm, QNAP has warned its clients of ongoing attacks targeting QNAP NAS (network-attached storage) devices and urged to strengthen their devices’ security by changing their passwords and default access port number, and disabling the admin account. The company warned its customers by stating, “recently QNAP has received multiple user reports of hackers attempting to log into QNAP devices using brute-force attacks – where hackers would try every possible password combination of a QNAP device user account. If a simple, weak, or predictable password is used (such as ‘password’ or ‘12345’) hackers can easily gain access to the device, breaching security, privacy, and confidentiality. ” If threat actor manages to guess the right password then they are able to secure full access of the targeted device, allowing them to exfiltrate confidential documents or install malware. If the hackers are unable to brute-force their way in, the NAS devices’ system logs will mark the at...

Apple Fixed Serious Actively Exploited Zero-Day Bug With iOS 14.4.2

Heads up iOS users! Make sure to update your devices with the latest iOS version… Apple Fixed Serious Actively Exploited Zero-Day Bug With iOS 14.4.2 on Latest Hacking News . from Latest Hacking News https://ift.tt/3cvb70g

CNA Hit by a Phoenix CryptoLocker Ransomware Attack

Image
  Insurance giant, CNA had to shut down its systems and temporarily close its website due to a novel ransomware attack. A new version of the Phoenix CryptoLocker malware was used in the attack, which happened earlier this week. The attack is believed to be linked to the Evil Corp hacking group.  CNA, a Chicago-based company is the seventh-largest commercial insurance provider in the world. According to a statement published on the home page of the website on Sunday, March 21, the company affirmed that they have “sustained a sophisticated cybersecurity attack”. “The attack caused a network disruption and impacted certain CNA systems, including corporate email,” they added.  Though CNA was the target of recent ransomware named Phoenix CryptoLocker, according to a report, the organization did not comment on the nature of the incident. CryptoLockers are a common form of ransomware that encrypts files on the computers it infects and demands a ransom from the victims in r...

$571 Million to be Paid over Bitcoin Scam

Image
  The Commodity Futures Trading Commission on 26th March 2021 declared that the U.S. District Court for the Southern District of New York entered a default judgment against Benjamin Reynolds, purportedly of Manchester, England, finding that he worked a fake plan to request bitcoin from members of the public and misappropriated customers of bitcoin. This case was brought in connection with the Division of Enforcement's Digital Assets Task Force.  The Commodity Futures Trading Commission (CFTC) is an independent agency of the US government made in 1974, that controls the U.S. derivatives markets, which incorporates futures, swaps, and certain kinds of options. The expressed mission of the CFTC is to promote the integrity, strength, and energy of the U.S. derivatives markets through sound guidelines. After the financial crisis of 2007–08 and since 2010 with the Dodd-Frank Wall Street Reform and Consumer Protection Act, the CFTC has been changing to carry more transparency and...

Ransomware Attacks Targeting UK’s Education Sector Increased, says NCSC

Image
  According to the warning by GCHQ's cybersecurity arm, NCSC, there has been a substantial spike in the number of ransomware attacks targeting education sector over the last month, just as schools were getting ready to resume in-person classes.  Ransomware attacks on the UK education sector have been on the rise, according to a new report. This includes developments seen in August and September 2020, along with attacks that have occurred since February 2021. It also offers mitigation recommendations to help in the defense of this sector.  According to the report, senior leaders must recognize the magnitude of the threat and the ability of the ransomware to cause serious harm to their organisations in terms of information exposure and access to important services.  Ransomware encrypts servers and files, making it impossible for businesses to provide services. Cyber criminals are anticipating that the need for schools and colleges to provide instruction would l...

Here are Some Interesting Facts About Website Hacking

Image
  How many websites are hacked every day? How frequently do hackers attack? Are there any solutions to fix the vulnerabilities? Which are the most hacked websites? These are some basic questions which arises in the reader’s mind. So, in this article you will get to know the latest statistics regarding website hacking.  Sadly, cyber-attacks are the harsh reality of today’s world and have become so rampant that it’s impossible to count the number of attacks. It requires a thorough research, manpower, time, equipment’s and money to conduct a global study that reaches out to millions of people and organizations.   Number of websites hacked in a year  You will be surprised to know that nearly 1.2 billion sites are running across the globe. It is such a large web that it is impossible to keep watch over. Google’s Safe Browsing tries to alert users about malicious websites and it currently conveys nearly 3 million warnings per day. Out of 1.2 billion sites, between ...

Purple Fox Malware Adopts Wormable Behavior To Target Windows Systems

A new threat has surfaced online for Windows users. Researchers have discovered Purple Fox malware… Purple Fox Malware Adopts Wormable Behavior To Target Windows Systems on Latest Hacking News . from Latest Hacking News https://ift.tt/31onrcj

Great Britain named Russia as the main threat in cyberspace

Image
 Lindy Cameron, executive director of Britain's National Cyber Security Center (NCSC), said on Friday that the Russian Federation poses the greatest threat to Britain in cyberspace. According to her, as in any other area related to security, in cyberspace, Russia poses the most acute and urgent threat to the United Kingdom. "We need to look carefully at China's ambitions for technological development. China will change the world we live in in a much more fundamental way than Russia," said Cameron. Against the backdrop of the current world situation, she urged against complacency, complaining that cybersecurity is still not getting the attention it deserves. She also cited incidents involving cyberattacks against IT company SolarWinds and Microsoft Exchange service. E Hacking News reminds that the NCSC is in charge of the Government Communications Center, the British intelligence agency responsible for conducting electronic reconnaissance and ensuring the protecti...

Fleeceware apps earned over $400 million on Android and iOS

Image
  Researchers at Avast have found an aggregate of 204 fleece ware applications with over a billion downloads and more than $400 million in revenue on the Apple App Store and Google Play Store. The purpose of these applications is to bring clients into a free trial to "test" the application, after which they overcharge them through subscriptions which sometimes run as high as $3,432 each year. These applications have no unique functionality and are only conduits for fleece ware scams. Avast has reported the fleece ware applications to both Apple and Google for audit. Fleece ware is a recently coined term that alludes to a mobile application that accompanies extreme subscription fees. Most applications incorporate a short free trial to attract the client. The application exploits clients who are inexperienced with how subscriptions work on cell phones, implying that clients can be charged even after they've erased the offending application. The fleece ware application...

Threat Actor Targets Guns.com, Spills Sensitive Information on Dark Web

Image
  As the domain name suggests, Guns.com is a major Minnesota, US-based platform to buy and sell guns online. It is also home to news and updates for firearm owners and lovers around the globe. However, on March 9th, 2021, a database seemingly belonging to Guns.com was dumped on the popular dark web site ‘Raid Forums’. Earlier this week, a large cache of files allegedly stolen from Guns.com also appeared on Raid Forums. The hackers behind this data dump claimed that files contain a complete database of Guns.com along with its source code. They further added that the breach took place somewhere around the end of 2020 and the data was sold privately meaning on Telegram channels or dark web forums. According to the analysis of Hackread.com, data dump contains substantial gun buyer information including user IDs, full names, nearly 400,000 email addresses, password hashes, physical addresses, zip codes, city, state, magneto IDs, contact numbers, and account creation date. One of...

Serious Security Vulnerabilities Found In Facebook for WordPress Plugin

WordPress admins using the Facebook for WordPress add-on should update their sites immediately. Researchers have… Serious Security Vulnerabilities Found In Facebook for WordPress Plugin on Latest Hacking News . from Latest Hacking News https://ift.tt/3d8ftd6

5 Ways How VPN helps you increase your data privacy in 2021

We store a lot of private information on the internet. It’s very important to protect… 5 Ways How VPN helps you increase your data privacy in 2021 on Latest Hacking News . from Latest Hacking News https://ift.tt/39lWDOp

Weintek’s HMI Found with Vulnerabilities which can Allow Attackers to Exploit Devices

Image
  Weintek's human-machine interface (HMI) products include three types of critical vulnerabilities, according to a cybersecurity researcher - who specializes in industrial control systems (ICS).  Customers should download relevant patches and follow measures to mitigate risks, according to a technical advisory posted by the company. The risk of abuse is higher if the devices are linked to an open network, according to the study. Customers can disconnect the devices from the network and update the operating system if the device is accessible by an open network. While devices that are not attached to an open network cannot be compromised, consumers are still encouraged to update their operating systems. If a computer can be accessed via a public IP address, it is said to be exposed to an open network.  Marcin Dudek, a senior ICS/OT security researcher at Poland’s CERT Polska, identified the flaws; the security flaws have also been discovered in the Weintek cMT product...

Hades Ransomware Attacks US Big Game

Image
  An obscure monetarily spurred threat group is utilizing the self-proclaimed Hades ransomware variant in cybercrime activities that have affected at least three victims since December 2020. Known victims incorporate a huge US transportation and logistics organization, a huge US consumer products organization, and a worldwide manufacturing organization.  Tactics, Techniques, and Procedures (TTP) utilized to compromise a victim network, escalate privileges, move laterally, evade defenses, exfiltrate data and deploy Hades ransomware are relatively consistent with other notable ransomware operators, utilizing a mix of commodity tooling and various living-off-the-land techniques. When Hades lands on a victim's machine, it duplicates itself and relaunches itself through the command line. The 'spare' duplicate is then erased and an executable is unloaded in memory. A scan is then performed in local directories and network offers to discover content to encrypt however every Ha...

Stratus Technologies, Sierra Wireless Suffered Ransomware Attacks

Once again, criminal hackers have targeted two corporate giants to make money by holding their… Stratus Technologies, Sierra Wireless Suffered Ransomware Attacks on Latest Hacking News . from Latest Hacking News https://ift.tt/39ihl1G

15 Email Delivery Terms Explained

Imagine that you created a very ideal subject line, chose the best sender name in… 15 Email Delivery Terms Explained on Latest Hacking News . from Latest Hacking News https://ift.tt/3uaCbrZ

Black code: Two critical vulnerabilities found in Intel processors

Image
Two new vulnerabilities have been found in Intel processors. They are undocumented capabilities of the manufacturer that allow hijacking control over the device. Access to them opens in a special mode that in most cases only Intel engineers have access to. However, in some scenarios it can also be activated by hackers. Information security experts suggest that these options may be present in all current Intel processors and see them as a major potential threat. According to Positive Technologies experts Mark Yermolov and Dmitry Sklyarov, there are two undocumented instructions in Intel processors that allow modification of the microcode and gain control over the processor and the entire system. "The discovered instructions allow bypassing all existing x86 architecture protection mechanisms in modern processors," said Yermolov. The experts specified that the features found are in Intel's Atom processor family, which has been updated since 2011 to the present day. ...

Cloudflare Enhance Users Safety With Browser Isolation, Page Shield

Cloudflare has launched two separate and useful security enhancements for its consumers in the same… Cloudflare Enhance Users Safety With Browser Isolation, Page Shield on Latest Hacking News . from Latest Hacking News https://ift.tt/3su45hS

Major Security Flaw Spotted in 5G Core Network Slicing Design

Image
  AdaptiveMobile security researchers have discovered a major flaw in the architecture of 5G network slicing and virtualized network functions. This vulnerability has been discovered to potentially allow data access and denial of service (DOS) attacks between different network slices on a mobile operator which leaves enterprise clients exposed to malicious cyberattacks.  Details of 5G network 5G, the 5th generation mobile network, is the latest global wireless standard after the previously introduced 1G, 2G, 3G, and 4G networks which makes it all the more important because it enables a new kind of network that is created to connect virtually everyone and everything including machines, objects and devices. How does 5G network slicing works? Network slicing basically permits a mobile operator to divide their core and radio network into multiple distinct virtual blocks that provide different amount of resources to different types of traffics. A great benefit of 5G net...

Forex Broker Leaked Customer Records

Image
  White hat hackers have disclosed a significant leak of client information by online forex dealer FBS Markets. This incorporates a great many confidential records, including names, passwords, email addresses, passport numbers, national IDs, credit cards, financial transactions and more. Details of the security breach, which has since been rectified after the dealer was cautioned, were uncovered by Chase Williams, a white hat hacker and site security expert, on the website WizCase. At this stage it isn't evident whether any of the leaked information has been utilized for deceitful purposes by threat actors. The information leak was revealed as a part of a progressing WizCase research project that scans for unstable servers, and tries to set up who the proprietors of those servers are. WizCase informed FBS of the issue. Williams said that FBS left a server containing right around 20 TB of information and over 16bn records exposed. Regardless of containing very sensitive financia...

REvil Ransomware Gang Introduces New Malware Features which can Reboot Infected Devices

Image
  The ransomware gang REvil introduced a special malware feature that allows attackers to reboot infected devices after encryption. REvil emerged in April 2019 and is also recognized by the names Sodinokibi and Sodin. The ransomware gang was linked to many important attacks, including attacks in May 2020 on popular law firm Grubman Shire Meiselas and Sacks and also an attack in April 2020 on Travelex, a London-based currency exchange that paid a $2.3 million ransom for recovering its data.  The MalwareHunter team researchers recently tweeted that the REvil operators have introduced two new command lines named 'AstraZeneca' and 'Franceisshit,' in Windows Safe Mode, which is utilized to reach the initialization screen for Windows devices.  "'AstraZeneca' is used to run the ransomware sample itself in the safe mode, and 'Franceisshit' is used to run a command in the safe mode to make the PC run in normal mode after the next reboot," team of ...

Shell Disclosed Third-Party Data Breach Due To Vulnerable Accellion FTA

Joining the list of victims suffering cybersecurity issues following the Accellion FTA bug exploit, now… Shell Disclosed Third-Party Data Breach Due To Vulnerable Accellion FTA on Latest Hacking News . from Latest Hacking News https://ift.tt/2PqjDou

Anonymous Hackers reportedly exposed the anti-Russian activities of the British Council

Image
The Anonymous hacker group published an analysis of documents belonging to various British government agencies, including the Foreign Office, according to the local media reports.  Anonymous previously accused British authorities and media organizations of influencing Russian-language media and attempting to shape the minds of their audiences in the way the West wants. In support of their position, the hackers published hundreds of copies of files that they called documents of the British Foreign and Parliamentary Ministries and organizations working for the authorities. The analysis notes that the purpose of such manipulations is to change power in Russia and change the Kremlin's foreign policy. It is also pointed out that the council is cooperating with British intelligence to be more effective. The hackers noted the organization's activity in Russia's neighboring states: in the Caucasus, Moldova, Belarus and Ukraine. "The British Council's operations in th...

Personal Details of 6.5 Million Israeli Voters Leaked Online

Image
  A database with the names and ID numbers of all the eligible voters in Israel was leaked online by anonymous hackers on Monday, a year after an identical breach and a day before the country’s fourth election in less than two years. The source of the data seems to be the app elector designed by the software firm Elector Software for the Israeli political party Likud. The threats some of which were sent directly to the firm, included warnings that the threat actors would leak data that was allegedly stolen from the app, as well as private information on the firm’s CEO Tzur Yemin, and his family unless the app ceases operating.  Last week, threat actors threatened to expose Israel’s full voter registry. The hackers initially shared links to download the data they claim to have stolen. The files were encrypted, while the threat actors were threatening to distribute the password unless the use of the Elector app was discontinued.  Earlier this week, the hackers revea...