hacking

Fig 15

India’s hackers-for-hire firm, BellTroX InfoTech Services, determined to be targeting US businesses, government officials, journalists, advocacy groups, non-profits…

Evidence shows BellTroX InfoTech Services, aka Dark Basin or Mercenary.Amanda, targeted government officials, celebrities, non-profit organizations, advocacy groups, journalists, investors, and large and small corporations in a hacking spree that is believed to be under investigation by U.S. law enforcement.
image thumb 1

Guccifer 2.0 mistakenly reveals identity after accidentally dropping VPN connection – and yes, pigs can fly

News erupted this week proclaiming the enigmatic hacker, Guccifer 2.0, accidentally dropped his VPN connection, revealing his secret identity. According to Daily Beast, his true IP address was revealed while he visited a social media site – and it tracked directly to Russia’s GRU headquarters. That’s akin to Batman forgetting to put on his mask or locking the door to the bat-cave. Could it happen? Sure. But not likely.
image thumb 2 1

Full text of ICA-2017-1 – Assessing Russian Activities and Intentions in Recent US Elections (with annotations)

The following was released to the general public on January 6, 2017 by the DNI (Director of National Intelligence). In short, the release accuses Russia of attempting to influence the US's 2016 election using a persona known as Guccifer 2.0 to release stolen (hacked) documents via Wikileaks. Regular readers will not be surprised by the findings as I drew this same conclusion in this article a few weeks ago.
image thumb161

The United States is outsourcing its Cyberspace (Cyber Command) Operations – really?

It’s a draft title Task Order Request for Cyberspace Operations Support Services in support of United States Cyber Command (USCYBERCOM). Oh, brother. That means the U.S. has bungled their cybersecurity so badly they’re now willing to outsource, and trust, this critical national security task to an outside contractor. Even a partner outside of the U.S. if they’re trusted status.
image thumb141

Interesting geographic attack vector from a Russian launched cyber counter-attack

I love the Russians. I know, strange to hear that from an American in modern day with a new “cold war” (seemingly) beginning to gain steam. Let’s say, I respect them. Their hackers in particular. Their response to a cyberattack is to launch a full-on offensive attack against the attacker, quite a different response from the Chinese who tend to just block attackers, or the Americans, who never even notice an attack is taking place.
image thumb91

Are Wild Neutron’s latest attacks related to the zero-day exploit(s) in Hacking Team’s drop?

Both Kaspersky and Symantec released reports this week pointing out the increase in attacks by Wild Neutron (aka Jripbot, Morpho, or Butterfly). WN had gone mostly dormant (or undetected?) since 2013 after hitting Apple, Facebook, Twitter, and Microsoft using zero-day Java exploits (seeded in the hacked forums of various websites) and the OSX/Pintsized Mac OS X or Windows Jiripbot backdoor.
image thumb491

Guardians of Peace (GOP) release Sony CEO Outlook data file with threat to movie goers

A Pastebin dump attributed to Guardians of Peace (GOP) was released a few hours ago followed by the purported screenplay for the upcoming movie The Interview. In the dump, the GOP continued to harp on their Christmas Day threat while including an invite to the public for special “requests”. The dump included another little surprise too – a threat to anyone who attends The Interview movie.

Start typing and press Enter to search

Shopping Cart

No products in the cart.

Signup now!

25%

Sign up for
our newsletter
and Get a Discount

Get notifications of new products, insider industry news, science and tech features, and more.