Researchers from network intelligence firm Renesys published an assessment this week that documents dozens of distinct hijacking events within the last few months where huge chunks of Internet traffic were purposefully diverted through distant service providers leading them to speculate that the traffic may have been “surreptitiously monitored or modified before being passed along to…
Category: Hacking and Security
Tango Tor down – U.S. authorities take down world’s largest Deep Web host (and dose Tor with uncloaking malware)
Word has hit the streets that the FBI has arrested Eric Eoin Marquesm the alleged owner of Freedom Hosting, the largest Deep Web hosting platform on the planet. The arrest was made in Ireland with the takedown reportedly disrupting the entire Tor network which is, sadly, the home of the majority of all illegal online…
Illuminati obsessed hacker – mysterious “Guccifer” entertains while outing prominent politicians and media personalities
His screen name is a bit humorous – and a bit scary. Nobody knows where the Illuminati-obsessed hacker originates from (IP addresses originate from Russia but language appears to be distinctly American). And his hacking expertise is well worth noting, especially if you are a politician that has found yourself in his cross-hairs. Right now,…
Digital ATM heist nets thieves $45 million – biggest ATM fraud in history
Federal prosecutors in Brooklyn have revealed that an international team of thieves had stolen close to $45 million in a matter of hours using hacked ATM debit cards. In New York City alone, thieves struck 2,094 ATM machines in 10 hours withdrawing $2.4 million in cash. It was the largest ATM heist in history.
Corps of Engineers confirms that sensitive National Inventory of Dams (NID) database was hacked by Chinese
The Army Corps of Engineers has admitted that an unauthorized Chinese user has hacked the National Inventory of Dams (NID) database in January 2013 and that the attack was not discovered until sometime in April. There are about 8,100 major dams in the U.S., and the NID database has information about all of them, including…
Largest DDoS attack in history clogs Internet and emphasizes the need to correct Open DNS resolvers [UPDATE]
A 300 Gigabit per second denial of service attack has been crowned the biggest DDoS operation to date. For over a week, European spam-blocking service Spamhaus has been subjected to a brutal Denial of Service attack that has been so large, it has threatened to slow down the entire Internet infrastructure.
Gotcha! U.S. accuses three people of Gozi Trojan bank raid spree – now seeking extradition
Described as one of the most financially destructive computer viruses in history, the Gozi Trojan was coded to “redesign” bank web pages allowing the hackers to obtain private information such as login credentials and three-factor authentication data. Over the years it has infected Microsoft Windows computers in the US, UK, Germany, Poland, France, Finland, Italy,…
Users beware – yet another way to secretly save SnapChat pictures without the other user knowing it
Besides using another device to capture the SnapChat image and other “hacks” already discovered that makes SnapChat not quite so “snappy”, yet another hack has been discovered which lets users secretly capture screen shots of SnapChat’s “private” pictures without notifying the sender. SnapChat is the self-claimed “sext-friendly” application that lets users share sexy or naked…
Red October espionage platform begins shutting down after exposure on Monday
The Operation Red October espionage campaign was exposed on Monday (1/14/13) by Russian anti-virus software maker Kaspersky Lab. The Red October network was found to target hundreds of diplomatic, governmental, and scientific organizations in at least 39 countries, including the Russian Federation (the most frequent target), Iran, Kazakhstan, Azerbaijan, Belgium, India, Afghanistan, Armenia, Turkmenistan, and…
Java vulnerability said to be “massively exploited” and already present in most exploit kits
A previously unknown and currently unpatched vulnerability in the latest version of Java is being “massively exploited” according to researchers. Code that exploits the vulnerability has been added to Blackhole, Cool, Nuclear Pack, and Redkit exploit kits. The attack code is reportedly “highly obfuscated” meaning it’s likely getting past security checks. According to researchers, the…








