phone

    • chevron_right

      Russian-based LockBit ransomware hackers attempt a comeback

      news.movim.eu / TheGuardian · Monday, 26 February, 2024 - 16:34

    Gang has set up a new site on the dark web and declares an intention to vote for Donald Trump

    The LockBit ransomware gang is attempting a comeback days after its operations were severely disrupted by a coordinated international crackdown.

    The Russian-based group has set up a new site on the dark web to advertise a small number of alleged victims and leak stolen data, as well as releasing a rambling statement explaining how it had been hobbled by the UK’s National Crime Agency, the FBI, Europol and other police agencies in operation last week.

    Continue reading...
    • chevron_right

      Hackers for sale: what we've learned from China's massive cyber leak

      news.movim.eu / TheGuardian · Sunday, 25 February, 2024 - 14:00

    Data from cyber security firm I-Soon offers a rare glimpse in to the inner workings of China’s hacking program

    A massive data leak from a Chinese cybersecurity firm has offered a rare glimpse into the inner workings of Beijing-linked hackers.

    Analysts say the leak is a treasure-trove of intel into the day-to-day operations of China’s hacking programme, which the FBI says is the biggest of any country. The company, I-Soon, has yet to confirm the leak is genuine and has not responded to a request for comment. As of Friday, the leaked data was removed from the online software repository GitHub, where it had been posted.

    Continue reading...
    • chevron_right

      Huge cybersecurity leak lifts lid on world of China’s hackers for hire

      news.movim.eu / TheGuardian · Friday, 23 February, 2024 - 05:00

    Leaked files shows range of services offered and bought, with data harvested from targets worldwide

    A big leak of data from a Chinese cybersecurity firm has revealed state security agents paying tens of thousands of pounds to harvest data on targets, including foreign governments, while hackers hoover up huge amounts of information on any person or institution who might be of interest to their prospective clients.

    The cache of more than 500 leaked files from the Chinese firm I-Soon was posted on the developer website Github and is thought by cybersecurity experts to be genuine. Some of the targets discussed include Nato and the UK Foreign Office.

    Continue reading...
    • chevron_right

      After years of losing, it’s finally feds’ turn to troll ransomware group

      news.movim.eu / ArsTechnica · Tuesday, 20 February, 2024 - 21:29 · 1 minute

    After years of losing, it’s finally feds’ turn to troll ransomware group

    Enlarge (credit: Getty Images)

    After years of being outmaneuvered by snarky ransomware criminals who tease and brag about each new victim they claim, international authorities finally got their chance to turn the tables, and they aren't squandering it.

    The top-notch trolling came after authorities from the US, UK, and Europol took down most of the infrastructure belonging to Lockbit, a ransomware syndicate that has extorted more than $120 million from thousands of victims around the world. On Tuesday, most of the sites Lockbit uses to shame its victims for being hacked, pressure them into paying, and brag of their hacking prowess began displaying content announcing the takedown. The seized infrastructure also hosted decryptors victims could use to recover their data.

    this_is_really_bad

    Authorities didn’t use the seized name-and-shame site solely for informational purposes. One section that appeared prominently gloated over the extraordinary extent of the system access investigators gained. Several images indicated they had control of /etc/shadow , a Linux file that stores cryptographically hashed passwords. This file, among the most security-sensitive ones in Linux, can be accessed only by a user with root, the highest level of system privileges.

    Read 9 remaining paragraphs | Comments

    • chevron_right

      Canada vows to ban Flipper Zero device in crackdown on car theft

      news.movim.eu / ArsTechnica · Saturday, 10 February, 2024 - 01:24

    A Flipper Zero device

    Enlarge / A Flipper Zero device (credit: https://flipperzero.one/)

    Canadian Prime Minister Justin Trudeau has identified an unlikely public enemy No. 1 in his new crackdown on car theft: the Flipper Zero, a $200 piece of open source hardware used to capture, analyze and interact with simple radio communications.

    On Thursday, the Innovation, Science and Economic Development Canada agency said it will “pursue all avenues to ban devices used to steal vehicles by copying the wireless signals for remote keyless entry, such as the Flipper Zero, which would allow for the removal of those devices from the Canadian marketplace through collaboration with law enforcement agencies.” A social media post by François-Philippe Champagne, the minister of that agency, said that as part of the push “we are banning the importation, sale and use of consumer hacking devices, like flippers, used to commit these crimes.”

    In remarks made the same day, Trudeau said the push will target similar tools that he said can be used to defeat anti-theft protections built into virtually all new cars.

    Read 18 remaining paragraphs | Comments

    • chevron_right

      « Il a trahi son pays » : l’auteur de la pire fuite de la CIA condamné à 40 ans de prison

      news.movim.eu / Numerama · Friday, 2 February, 2024 - 09:56

    central agency

    « La plus grande violation de données de l'histoire de la CIA ». Le département de la justice américaine a réagi à la condamnation de Joshua Schulte, un ancien employé de l'agence, à 40 ans de prison. Il a été à l'origine de la fuite baptisée Vault 7, qui a exposé l'arsenal numérique de la CIA.

    • chevron_right

      Convicted console hacker says he paid Nintendo $25 a month from prison

      news.movim.eu / ArsTechnica · Thursday, 1 February, 2024 - 23:57

    It's-a me, the long arm of the law.

    Enlarge / It's-a me, the long arm of the law. (credit: Aurich Lawson / Nintendo / Getty Images)

    When 54-year-old Gary Bowser pleaded guilty to his role in helping Team Xecuter with their piracy-enabling line of console accessories , he realized he would likely never pay back the $14.5 million he owed Nintendo in civil and criminal penalties . In a new interview with The Guardian , though, Bowser says he began making $25 monthly payments toward those massive fines even while serving a related prison sentence.

    Last year, Bowser was released after serving 14 months of that 40-month sentence (in addition to 16 months of pre-trial detention), which was spread across several different prisons. During part of that stay, Bowser tells The Guardian, he was paid $1 an hour for four-hour shifts counseling other prisoners on suicide watch.

    From that money, Bowser says he “was paying Nintendo $25 a month” while behind bars. That lines up roughly with a discussion Bowser had with the Nick Moses podcast last year, where he said he had already paid $175 to Nintendo during his detention.

    Read 8 remaining paragraphs | Comments

    • chevron_right

      The life and times of Cozy Bear, the Russian hackers who just hit Microsoft and HPE

      news.movim.eu / ArsTechnica · Friday, 26 January, 2024 - 13:15 · 1 minute

    The life and times of Cozy Bear, the Russian hackers who just hit Microsoft and HPE

    Enlarge (credit: Getty Images)

    Hewlett Packard Enterprise (HPE) said Wednesday that Kremlin-backed actors hacked into the email accounts of its security personnel and other employees last May—and maintained surreptitious access until December. The disclosure was the second revelation of a major corporate network breach by the hacking group in five days.

    The hacking group that hit HPE is the same one that Microsoft said Friday broke into its corporate network in November and monitored email accounts of senior executives and security team members until being driven out earlier this month. Microsoft tracks the group as Midnight Blizzard. (Under the company’s recently retired threat actor naming convention, which was based on chemical elements, the group was known as Nobelium.) But it is perhaps better known by the name Cozy Bear—though researchers have also dubbed it APT29, the Dukes, Cloaked Ursa, and Dark Halo.

    “On December 12, 2023, Hewlett Packard Enterprise was notified that a suspected nation-state actor, believed to be the threat actor Midnight Blizzard, the state-sponsored actor also known as Cozy Bear, had gained unauthorized access to HPE’s cloud-based email environment,” company lawyers wrote in a filing with the Securities and Exchange Commission. “The Company, with assistance from external cybersecurity experts, immediately activated our response process to investigate, contain, and remediate the incident, eradicating the activity. Based on our investigation, we now believe that the threat actor accessed and exfiltrated data beginning in May 2023 from a small percentage of HPE mailboxes belonging to individuals in our cybersecurity, go-to-market, business segments, and other functions.”

    Read 15 remaining paragraphs | Comments

    • chevron_right

      AI will increase the number and impact of cyber attacks, intel officers say

      news.movim.eu / ArsTechnica · Thursday, 25 January, 2024 - 13:44

    AI will increase the number and impact of cyber attacks, intel officers say

    Enlarge (credit: Getty Images)

    Threats from malicious cyber activity are likely to increase as nation-states, financially motivated criminals, and novices increasingly incorporate artificial intelligence into their routines, the UK’s top intelligence agency said.

    The assessment, from the UK’s Government Communications Headquarters, predicted ransomware will be the biggest threat to get a boost from AI over the next two years. AI will lower barriers to entry, a change that will bring a surge of new entrants into the criminal enterprise. More experienced threat actors—such as nation-states, the commercial firms that serve them, and financially motivated crime groups—will likely also benefit, as AI allows them to identify vulnerabilities and bypass security defenses more efficiently.

    “The emergent use of AI in cyber attacks is evolutionary not revolutionary, meaning that it enhances existing threats like ransomware but does not transform the risk landscape in the near term,” Lindly Cameron, CEO of the GCHQ’s National Cyber Security Centre, said . Cameron and other UK intelligence officials said that their country must ramp up defenses to counter the growing threat.

    Read 11 remaining paragraphs | Comments