Hacking & Cracking

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#151

Post by RTH10260 »

same - mmore like an insiders job
A hacker gained access to 100 million Capital One credit card applications and accounts
By Rob McLean, CNN Business

Updated 1246 GMT (2046 HKT) July 30, 2019
Capital One hack exposes 100 million customers

New York (CNN Business)In one of the biggest data breaches ever, a hacker gained access to more than 100 million Capital One customers' accounts and credit card applications earlier this year.

Paige Thompson is accused of breaking into a Capital One server and gaining access to 140,000 Social Security numbers, 1 million Canadian Social Insurance numbers and 80,000 bank account numbers, in addition to an undisclosed number of people's names, addresses, credit scores, credit limits, balances, and other information, according to the bank and the US Department of Justice.

A criminal complaint says Thompson tried to share the information with others online. The 33-year-old, who lives in Seattle, had previously worked as a tech company software engineer for Amazon (AMZN) Web Services, the cloud hosting company that Capital One was using, the Justice Department said. She was able to gain access by exploiting a misconfigured web application firewall, according to a court filing.


https://edition.cnn.com/2019/07/29/busi ... index.html

User avatar
tek
Posts: 4458
Joined: Fri Nov 16, 2012 6:02 pm
Location: Lake Humidity, FL
Occupation: Damned if I know

Re: Hacking & Cracking

#152

Post by tek »

I think not really "inside" .. all speculation on my part, of course..

She probably just knew that a lot of companies misconfigure their firewalls when setting up in the cloud (and, in fact, when setting up their own datacenter)... and because she had deep S3 experience, she probably probed around AWS-hosted sites.. and when she found a crack she knew what to go look for to get at the storage.
There's no way back
from there to here

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#153

Post by RTH10260 »

Websites have been quietly hacking iPhones for years, says Google
Websites delivered iOS malware to thousands of visitors in the biggest iPhone hack ever. There’s no telling who was infected—or who was behind it.
by Patrick Howell O'Neill
Aug 30, 2019

Malware could steal passwords, encrypted messages and contacts
It's not clear who was behind the hacking campaign or who was targeted
If you have updated your iPhone you are protected


The largest ever known attack against iPhone users lasted at least two years and hit potentially thousands of people, according to research published by Google.

The malware could ransack the entire iPhone to steal passwords, encrypted messages, location, contacts, and other extremely sensitive information. The data was then sent to a command and control server which the hackers used to run the operation. The scope, execution, and persistence of the unprecedented hacking campaign points to a potential nation-backed operation but the identity of both the hackers and their targets is still unknown.

“The data taken is the ‘juicy’ data," says Jonathan Levin, an author of three books on the internals of Apple's operating systems. "Take all the passwords from the keychain, location data, chats/contacts/etc, and build a shadow network of connections of all your victims. Surely by six degrees of separation you'll find interesting targets there."

Apple patched the bugs quickly in February 2019 so everyone who has updated their iPhone since then is protected. Rebooting the iPhone wiped the malware but the data had already been taken. Exactly who was infected remains an open question. iPhone users themselves likely wouldn’t know because the malware runs in the background with no visual indicator and no way for an iOS user to view the processes running on the device.


https://www.technologyreview.com/s/6142 ... ys-google/

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#154

Post by RTH10260 »

Cybercriminals Impersonate Chief Exec's Voice with AI Software
Scammers leveraged artificial intelligence software to mimic the voice of a chief executive and successfully request $243,000.

Fraudsters are constantly looking for new ways to scam their victims. One unique case gives the security industry a glimpse of what they could do with artificial intelligence (AI) and voice recording.

As part of an incident in March, an attacker called the CEO of a UK-based energy business pretending to be the head of its German parent company. Analysts believe AI-based software was used to impersonate the chief executive's voice, as it had the slight German accent and other qualities the UK CEO recognized in his boss's voice — qualities that led him to believe the call was legitimate. The caller issued an "urgent" request to the CEO, demanding he transfer $243,000 to a Hungarian supplier within an hour's time.

The transfer went through and the money was later moved to other countries. Scammers continued to contact the UK company and make additional payment requests, according to Euler Hermes, the organization's insurer. However, the CEO grew suspicious and did not transfer the funds.

While this incident is still under investigation, the Wall Street Journal cites officials saying this impersonation attack is the first in which fraudsters "clearly" leveraged AI to mimic someone's voice. It's believed this technology could make it easier for scammers to manipulate enterprise victims, complicating matters for defenders who don't yet have the technology to detect them.


https://www.darkreading.com/risk/cyberc ... id/1335722

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#155

Post by RTH10260 »

some food delivery service is eating crow
Important security notice about your DoorDash account
DoorDash

We take the security of our community very seriously. Earlier this month, we became aware of unusual activity involving a third-party service provider. We immediately launched an investigation and outside security experts were engaged to assess what occurred. We were subsequently able to determine that an unauthorized third party accessed some DoorDash user data on May 4, 2019. We took immediate steps to block further access by the unauthorized third party and to enhance security across our platform. We are reaching out directly to affected users.

Who was affected and what data was accessed?

Not every user was affected. Approximately 4.9 million consumers, Dashers, and merchants who joined our platform on or before April 5, 2018, are affected. Users who joined after April 5, 2018 are not affected. The type of user data accessed could include:


https://blog.doordash.com/important-sec ... d90ddf5996

User avatar
Volkonski
Posts: 28873
Joined: Sat Mar 02, 2013 4:44 pm
Location: Texas Gulf Coast and North Fork of Long Island
Occupation: Retired Mechanical Engineer

Re: Hacking & Cracking

#156

Post by Volkonski »

Shimon Prokupecz
@ShimonPro
·
9m
Hackers linked to the Iranian government attempted to attack a 2020 U.S. presidential campaign, Microsoft revealed Friday. The group Microsoft calls “Phosphorus” attempted to hack the campaign between August and September, the company said.
@donie
Image“If everyone fought for their own convictions there would be no war.”
― Leo Tolstoy, War and Peace

User avatar
Volkonski
Posts: 28873
Joined: Sat Mar 02, 2013 4:44 pm
Location: Texas Gulf Coast and North Fork of Long Island
Occupation: Retired Mechanical Engineer

Re: Hacking & Cracking

#157

Post by Volkonski »

Exclusive: Trump campaign targeted by Iran-linked hackers - sources

https://www.reuters.com/article/us-cybe ... SKBN1WJ2B4
A hacking group that appears to be linked to the Iranian government attempted to break into President Donald Trump’s re-election campaign, but did not succeed, sources familiar with the operation said on Friday.

Earlier in the day, Microsoft Corp (MSFT.O) said that an unnamed presidential campaign was targeted by hackers, which the software company linked to Iran.

The Trump campaign’s Director of Communications Tim Murtaugh said, “We have no indication that any of our campaign infrastructure was targeted.”
Image“If everyone fought for their own convictions there would be no war.”
― Leo Tolstoy, War and Peace

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#158

Post by RTH10260 »

"Data Security Incident" at CafePress.com

We are writing to notify you of a data security incident involving your personal information. This email explains what happened and provides information about what you can do in response. We are taking this matter very seriously and sincerely regret any concern it may cause you.

What Happened

CafePress recently discovered that an unidentified third party obtained customer information, without authorization, that was contained in a CafePress database. Based on our investigation to date, this may have occurred on or about February 19, 2019.

What Information Was Involved

The information may have included your name, email address, the password to your customer CafePress account, and other information.
Source: email

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#159

Post by RTH10260 »

It happens even to the best ...
Adobe exposed nearly 7.5 million Creative Cloud accounts to the public

BY MATT BINDER
OCT 25, 2019

Graphic designers, video editors, and other creatives beware: Nearly 7.5 million Adobe Creative Cloud accounts were exposed to the public.

The database containing the sensitive user info, discovered by security researcher Bob Diachenko and Comparitech, was accessible to anyone through a web browser.

The exposed user data for the nearly 7.5 million accounts included email addresses, the Adobe products they subscribed to, account creation date, subscription and payment status, local timezone, member ID, time of last login, and whether they were an Adobe employee.

While no passwords or financial information such as credit card numbers were exposed, the data is sensitive enough to cause real problems for Creative Cloud users.

It’s easy to see how a bad actor could use this data to create highly targeted and convincing phishing campaigns.

Adobe Creative Cloud includes industry standard software and some of the most popular apps for creatives such as Photoshop, Premiere, Illustrator, After Effects, InDesign, and more.

According to Comparitech, Diachenko immediately reached out to Adobe upon discovering the open database on Oct. 19. Adobe addressed the issue immediately and secured the database on the same day.

Diachenko believes the data was left exposed for about a week, however it’s unclear when the database first became publicly accessible or if there was any unauthorized access.

Adobe was last hit with a major data leak in 2013 when a hacker gained access to 38 million customers' usernames, encrypted passwords, and credit card info.

Creative Cloud customers should be wary of any suspicious emails they receive claiming to be from the company.


https://mashable.com/article/adobe-crea ... s-exposed/

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#160

Post by RTH10260 »

Breaches at NetworkSolutions, Register.com, and Web.com
Top domain name registrars NetworkSolutions.com, Register.com and Web.com are asking customers to reset their passwords after discovering an intrusion in August 2019 in which customer account information was accessed.


A notice to customers at notice.web.com:
“On October 16, 2019, Web.com determined that a third-party gained unauthorized access to a limited number of its computer systems in late August 2019, and as a result, account information may have been accessed,” Web.com said in a written statement. “No credit card data was compromised as a result of this incident.”
Jacksonville, Fla.-based Web.com said the information exposed includes “contact details such as name, address, phone numbers, email address and information about the services that we offer to a given account holder.”

The “such as” wording made me ask whether the company has any reason to believe passwords — scrambled or otherwise — were accessed.

A spokesperson for Web.com later clarified that the company does not believe customer passwords were accessed.



https://krebsonsecurity.com/2019/10/bre ... d-web-com/

User avatar
Notorial Dissent
Posts: 13947
Joined: Thu Oct 17, 2013 8:21 pm

Re: Hacking & Cracking

#161

Post by Notorial Dissent »

Not comforting I would say, and they are just now figuring this out.....
The fact that you sincerely and wholeheartedly believe that the “Law of Gravity” is unconstitutional and a violation of your sovereign rights, does not absolve you of adherence to it.

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#162

Post by RTH10260 »

Macy’s Suffers Data Breach by Magecart Cybercriminals

Lindsey O'Donnell
November 19, 2019 9:56 am

Obfuscated Magecart script was discovered on two Macys.com webpages, scooping up holiday shoppers’ payment card information.

The department store Macy’s is warning that web skimmer malware was discovered on Macys.com collecting customers’ payment card information. The attack has been linked to Magecart, a notorious umbrella group made up of various cybercriminal affiliates that is known for injecting payment card skimmers into ecommerce websites.

According to a data breach notice sent to customers, “an unauthorized third party added unauthorized computer code” to Macys.com on Oct. 7. The code, which was discovered and removed on Oct. 15, was collecting customers’ first and last names, addresses, phone number and email addresses, payment card information (including number, security code, and expiration dates).

“There is no reason to believe that this incident could be used by cybercriminals to open new accounts in your name. Nonetheless, you should remain vigilant for incidents of financial fraud and identify theft by regularly reviewing your account statements and immediately reporting any suspicious activity to your card issuer,” said Macy’s in its data breach notice.


https://threatpost.com/macys-data-breac ... rt/150393/

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#163

Post by RTH10260 »

T-Mobile says some prepaid customers' info affected by breach

BY TAL AXELROD

T-Mobile disclosed Friday that a hacker gained access to information such as billing addresses and phone numbers from prepaid user accounts.

The mobile network said it discovered the breach earlier this month and said it impacted less than 1.5 percent of T-Mobile customers before being shut down by the company’s cybersecurity team.

The information that was hacked included names, billing addresses and phone numbers, among other info. T-Mobile assured customers that no financial data was included in the hack and that no passwords were compromised.

“Our Cybersecurity team discovered and shut down malicious, unauthorized access to some information related to your T-Mobile prepaid wireless account. We promptly reported this to authorities. None of your financial data (including credit card information) or social security numbers was involved, and no passwords were compromised,” T-Mobile said in a statement.



https://thehill.com/policy/technology/4 ... -by-breach

User avatar
Slim Cognito
Posts: 8418
Joined: Fri Aug 29, 2014 8:37 am

Re: Hacking & Cracking

#164

Post by Slim Cognito »

https://finance.yahoo.com/news/now-even ... _test=1_04
Now even the FBI is warning about your smart TV's security
If I'm summarizing correctly, the article says your tv is waaaaaay easier to hack than your computer, giving hackers the opportunity to access your modem and the tv's camera and microphone.

We just bought a black Friday* smart tv, but it's on the cheaper side. We couldn't find a camera, which this article advises you cover with black tape.

It does have a microphone, which we thought would be cool when we bought the tv but it's a pain in the ass. Some character on tv will say what is apparently a wakeup word, and then the tv opens a small browser window giving us the option to search. After reading this article, my plan is to figure out how to turn the microphone off.

Thoughts?

*not in-store on Black Friday. We aren't crazy. Black Friday deals started in mid November, both in-store and on-line.

Well...we aren't THAT crazy.
ImageImageImage x4

User avatar
Notorial Dissent
Posts: 13947
Joined: Thu Oct 17, 2013 8:21 pm

Re: Hacking & Cracking

#165

Post by Notorial Dissent »

Definitely black tape. The instructions should show where the microphone and camera are. There should also be control settings in the setup to shut them off, for whatever good that will do.
The fact that you sincerely and wholeheartedly believe that the “Law of Gravity” is unconstitutional and a violation of your sovereign rights, does not absolve you of adherence to it.

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#166

Post by RTH10260 »

Data of 21 million Mixcloud users put up for sale on the dark web
Emails, usernames, and strong-hashed passwords sold for $2,000.

By Catalin Cimpanu for Zero Day | December 1, 2019 -- 14:37 GMT (14:37 GMT) | Topic: Security

A hacker has breached online music streaming service Mixcloud earlier this month, and is now selling the site's user data online, on a dark web marketplace.

The hack came to light on Friday, when the hacker contacted several journalists to share news of the breach and to provide data samples, including to ZDNet.

Accordig to a sample of the stolen data, the hacker is selling Mixcloud user information that includes details such as usernames, email addresses, hashed password strings, users' country of origin, registration dates, last login dates, and IP addresses.

The breach appears to have taken place on or before November 13, which is the registration date for the last user profile included in the data dump.

ZDNet emailed several users whose data was included in the sample we received, and several have confirmed they had recently registered a Mixcloud account. Tech news sites TechCrunch and Motherboard also verified the data authenticity through other means, as well.

Mixcloud confirmed the breach in a blog post on Saturday.

The company said that most users had signed up through Facebook, and did not have a password associated with their account.

For those that did, Mixcloud said that passwords should be safe, as each one was salted and passed through a strong hashing function (SHA256 algorightm, accordng to the sample we received), making it currently impossible to reverse back to its cleartext form.

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#167

Post by RTH10260 »

110 Nursing Homes Cut Off from Health Records in Ransomware Attack

A ransomware outbreak has besieged a Wisconsin based IT company that provides cloud data hosting, security and access management to more than 100 nursing homes across the United States. The ongoing attack is preventing these care centers from accessing crucial patient medical records, and the IT company’s owner says she fears this incident could soon lead not only to the closure of her business, but also to the untimely demise of some patients.

Milwaukee, Wisc. based Virtual Care Provider Inc. (VCPI) provides IT consulting, Internet access, data storage and security services to some 110 nursing homes and acute-care facilities in 45 states. All told, VCPI is responsible for maintaining approximately 80,000 computers and servers that assist those facilities.

At around 1:30 a.m. CT on Nov. 17, unknown attackers launched a ransomware strain known as Ryuk inside VCPI’s networks, encrypting all data the company hosts for its clients and demanding a whopping $14 million ransom in exchange for a digital key needed to unlock access to the files. Ryuk has made a name for itself targeting businesses that supply services to other companies — particularly cloud-data firms — with the ransom demands set according to the victim’s perceived ability to pay.

In an interview with KrebsOnSecurity today, VCPI chief executive and owner Karen Christianson said the attack had affected virtually all of their core offerings, including Internet service and email, access to patient records, client billing and phone systems, and even VCPI’s own payroll operations that serve nearly 150 company employees.

User avatar
Volkonski
Posts: 28873
Joined: Sat Mar 02, 2013 4:44 pm
Location: Texas Gulf Coast and North Fork of Long Island
Occupation: Retired Mechanical Engineer

Re: Hacking & Cracking

#168

Post by Volkonski »

MSNBC
@MSNBC
·
48m
US federal prosecutors have filed charges against 2 Russian nationals who are accused of a string of attacks on computer systems in the US that netted them over $3M.
Image
Image“If everyone fought for their own convictions there would be no war.”
― Leo Tolstoy, War and Peace

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#169

Post by RTH10260 »

New Orleans declares state of emergency following ransomware attack
Kirsten Korosec@kirstenkorosec / 9:04 pm CET • December 14, 2019

New Orleans declared a state of emergency and shut down its computers after a cyber security event, the latest in a string of city and state governments to be attacked by hackers.

Suspicious activity was spotted around 5 a.m. Friday morning. By 8 a.m., there was an uptick in that activity, which included evidence of phishing attempts and ransomware, Kim LaGrue, the city’s head of IT said in a press conference. Once the city confirmed it was under attack, servers and computers were shut down.

While ransomware was detected there are no requests made to the city of New Orleans at this time, but that is very much a part of our investigation, New Orleans Mayor LaToya Cantrell said during a press conference.

:snippity:

New Orleans, it appears was somewhat prepared, which officials said was the result of training and its ability to operate without internet. The investigation is in its early stages, but for now it appears that city employees didn’t interact with or provide credentials or any information to possible attackers, according to officials.

“If there is a positive about being a city that has been touched by disasters and essentially been brought down to zero in the past, is that our plans and activity from a public safety perspective reflect the fact that we can operate with internet, without city networking,” said Collin Arnold, director of Homeland Security, adding that they’ve gone back to pen and paper for now.

Police, fire and EMS are prepared to work outside of the city’s internet network. Emergency communications are not affected by the cybersecurity incident, according to city officials. However, other services such as scheduling building inspections are being handled manually.


https://techcrunch.com/2019/12/14/new-o ... re-attack/

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#170

Post by RTH10260 »

treasure trove of old information
Researcher: Data on 267 million Facebook users exposed
By FRANK BAJAK

A Ukrainian security researcher reported finding a database with the names, phone numbers and unique user IDs of more than 267 million Facebook users — nearly all U.S.-based — on the open internet. That data was likely harvested by criminals, said researcher Bob Diachenko, an independent security consultant in Kyiv.

The database, which Diachenko discovered with a search engine, was freely accessible online for at least 10 days beginning Dec. 4, he said. He notified the internet provider where it was hosted when he found it on Dec. 14; five days later it was no longer available.

Diachenko said someone downloaded the database to a hacker forum two days before he discovered it so it may have been shared among online thieves.

He first reported the finding Thursday in partnership with the U.K. tech news website Comparitech, which editor Paul Bischoff said has been helping write up Diachenko’s discoveries of unsecured databases for about a year.

The researcher provided the AP with a 10-record sample from the database and the IDs — and two phone numbers that were answered — checked out against real Facebook users.

The evidence suggests the data was collected illegally, most likely by criminals in Vietnam who may have “scraped” it from public Facebook pages or by somehow obtaining privileged access to the service. Scraping is automated data-harvesting done by bots. A small fraction of the database include details on Vietnam-based users.

Diachenko said he did not share the database with Facebook, which did not directly confirm the finding. In a statement, the social network said it was investigating the issue and that the finding “likely” involved information obtained before Facebook took unspecified data-protection measures in recent years.


https://apnews.com/bdf02dbe7bf266b025b6f1b0ae5860fd

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#171

Post by RTH10260 »

Someone Tried to Hack My Phone. Technology Researchers Accused Saudi Arabia.
From a suspicious text message I received, technology researchers concluded that hackers working for Saudi Arabia had targeted my phone with powerful Israeli software.

By Ben Hubbard
Published Jan. 28, 2020 Updated Jan. 30, 2020

BEIRUT, Lebanon — On June 21, 2018, I received an Arabic text message on my cellphone that read: “Ben Hubbard and the story of the Saudi royal family,” with a link for a website, arabnews365.com.

I had been writing extensively about Saudi Arabia, including its royal family, and at first glance the link appeared to be a Saudi news story about my coverage — a subject that would normally grab my attention.

But it also struck me as fishy, so I refrained from clicking and decided to investigate. That led me to the booming market among governments for hacking technologies and a lesson in how easily the most intimate information on our phones — chats, contacts, passwords and photos — could become a target.


https://www.nytimes.com/2020/01/28/read ... rabia.html

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#172

Post by RTH10260 »

Exclusive: Hackers acting in Turkey's interests believed to be behind recent cyberattacks - sources
Jack Stubbs, Christopher Bing, Joseph Menn

LONDON (Reuters) - Sweeping cyberattacks targeting governments and other organizations in Europe and the Middle East are believed to be the work of hackers acting in the interests of the Turkish government, three senior Western security officials said.

The hackers have attacked at least 30 organizations, including government ministries, embassies and security services as well as companies and other groups, according to a Reuters review of public internet records. Victims have included Cypriot and Greek government email services and the Iraqi government’s national security advisor, the records show.

The attacks involve intercepting internet traffic to victim websites, potentially enabling hackers to obtain illicit access to the networks of government bodies and other organizations.

According to two British officials and one U.S. official, the activity bears the hallmarks of a state-backed cyber espionage operation conducted to advance Turkish interests.

The officials said that conclusion was based on three elements: the identities and locations of the victims, which included governments of countries that are geopolitically significant to Turkey; similarities to previous attacks that they say used infrastructure registered from Turkey; and information contained in confidential intelligence assessments that they declined to detail.


https://www.reuters.com/article/us-cybe ... SKBN1ZQ10X

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#173

Post by RTH10260 »

Interpol Arrests 3 Indonesian Credit Card Hackers for Magecart
26 January 2020|CyberSecurity

The Indonesian National Police in a joint press conference with Interpol earlier today announced the arrest of three Magecart-style Indonesian hackers who had compromised hundreds of international e-commerce websites and stolen payment card details of their online shoppers.


Dubbed 'Operation Night Fury,' the investigation was led by Interpol's ASEAN Cyber Capability Desk, a joint initiative by law enforcement agencies of Southeast Asian countries to combat cybercrime.

According to the press conference, all three accused (23, 26, and 35 years old) were arrested last year in December from Jakarta and Yogyakarta and charged with criminal laws related to the data theft, fraud, and unauthorized access.

Just like most of the other widespread Magecart attacks, the modus operandi behind this series of attacks also involved exploiting unpatched vulnerabilities in e-commerce websites powered by Magento and WordPress content management platforms.


https://cimasafe.com/safe-news/f/interp ... r-magecart

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#174

Post by RTH10260 »

Israeli soldiers tricked into installing malware by Hamas agents posing as women
IDF: Six social media accounts were redirecting soldiers to installing three malware-infected apps.

By Catalin Cimpanu for Zero Day | February 17, 2020 -- 00:10 GMT (00:10 GMT) | Topic: Security

Members of the Hamas Palestinian militant group have posed as young teenage girls to lure Israeli soldiers into installing malware-infected apps on their phones, a spokesperson for the Israeli Defence Force (IDF) said today.

Some soldiers fell for the scam, but IDF said they detected the infections, tracked down the malware, and then took down Hamas' hacking infrastructure.

IDF said Hamas operatives created Facebook, Instagram, and Telegram accounts and then approached IDF soldiers.

According to IDF spokesperson Brigadier General Hild Silberman, Hamas agents posed as new Israeli immigrants to excuse their lacking knowledge of the Hebrew language.



https://www.zdnet.com/article/israeli-m ... -as-women/

User avatar
RTH10260
Posts: 26611
Joined: Tue Mar 02, 2010 8:52 am
Location: Near the Swiss Alps

Re: Hacking & Cracking

#175

Post by RTH10260 »

Personal information of nearly 360,000 Quebec teachers exposed in data breach
BY STAFF THE CANADIAN PRESS
Posted February 21, 2020 9:53 pm
Updated February 21, 2020 9:58 pm

The personal information of nearly 360,000 teachers in Quebec may have been stolen in a data theft, the Quebec government confirmed on Friday.

Quebec’s Treasury Board took stock in the wake of the ongoing investigation by the Sûreté du Québec (SQ) into identity theft of people working or having worked as teachers.

The hackers had access to a database containing personal information after stealing a user code and password, Quebec’s Treasury Board statement said.

A year ago, the Sûreté du Québec (SQ) arrested two men from Montreal in connection with several identity thefts committed in the spring of 2018 in several regions of Quebec.

The reliability of the government’s computer systems is not called into question, since the theft would have been carried out using a fraudulent password and access code, the board said on Friday.

The Ministry of Education obtained confirmation on Wednesday that their personal data may have been stolen.


https://globalnews.ca/news/6582061/pers ... ata-breach
This just in: nobody within the Quebec Treasury Board has ever heard of Multi-Factor Authentication.

Post Reply

Return to “Computers & Internet”