Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Three Ukraininan Hackers illegally connected to the networks and services of the Mobile Operator

Three Hackers from Ukraine City Lviv are accused of illegally accessing networks of telecommunications sector on the territory of Moldova, according to the local report.

The case has already been brought to the court. According to investigators, the defendants used some special equipment to gain access to the networks and services of the telecoms.

In particular, hackers damaged the mobile operator "Orange". From May to August 2017 criminals lived in rented apartments in Kishenev and used electronic communications of the company. They offered services of mobile operator on behalf of "Orange" with high price, keeping for themselves all money.

The total damage cost of "Orange" is estimated about 1.4 million Rupee.

Moreover, the police found not only technical equipment, but also tools for using drugs and substance of vegetable origin, most likely, it will be marijuana.

If convicted, the hackers will receive 5 years sentence in prison or they will have to pay 12,500 Rupee penalty.

- Christina

 

Hackers compromised over 50,000 accounts of 'Kinopoisk' website to change rating of movie 'Crimea'


Hackers compromised over 50,000 user accounts of the Kinopoisk(Movie Search) website - One of the leading online database for movies in Russia.  The main goal of hackers was increasing the rating of a film "Crimea", which was expected on the screens.

The incident first came to the spotlight when some of the users noticed the marks in their profile that they are expecting the premiere of the film "Crimea".  The administration of "Kinopoisk" received complaints from number of users.

After internal investigation, Representatives of the website has removed over 50,000 incorrectly marked marks.  After removing those marks, the number of marks is reduced from 70,000 to 17,000 - The rating of the move is reduced from 60% to 20%.

The technical Support staff of the portal also send notification to all the users of the hacked accounts to change the password.  They also recommended to set a strong password and not to use the same password in any other services.

- Christina


CCleaner malware targets major tech companies

(pc-Google images)
The recent CCleaner malware outbreak where hackers used a popular PC clean-up tool to spread malware was perhaps a more targeted and sophisticated attack than it initially seemed.

Researchers discovered that the malware was specifically trying to gain access to internal networks in at least 20 tech companies, including Google, Samsung, Microsoft, Sony, HTC, Linksys, D-Link, and Cisco itself.

Researchers at Cisco and Avast discovered that the malware was specifically going after a list of internal domains at the time its "command-and-control" server was seized.

Avast wrote, “At the time the server was taken down, the attack was targeting select large technology and telecommunication companies in Japan, Taiwan, UK, Germany and the US. Given that CCleaner is a consumer-oriented product, this was a typical watering hole attack where the vast majority of users were uninteresting for the attacker, but select ones were.”

Cisco reported that the hackers have been successful in installing the malware on more than 700,000 machines and more than 20 machines have received the second-stage payload.

From September 12 to September 16, the highly advanced second stage was reserved for computers inside 20 companies or Web properties, including Cisco, Microsoft, Gmail, VMware, Akamai, Sony, and Samsung.

While Avast is advising individual users to upgrade to its latest version and to use an anti-virus product, Cisco recommends restoring PCs using backup made before CCleaner was installed.

Iranian hackers target US, Saudi aviation sector

(pc-Google images)
A cyber espionage group suspected of working in Iran for its government is targeting the aviation and energy industries in Saudi Arabia, the US and South Korea.

According to US security firm FireEye, the hacking group that it calls Advanced Persistent Threat 33 (or APT33) has been targeting critical infrastructure, energy and military sectors since at least 2013 as part of a massive cyber-espionage operation to gather intelligence and steal trade secrets.

The report added, "We assess the targeting of multiple companies with aviation-related partnerships to Saudi Arabia indicates that APT33 may possibly be looking to gain insights on Saudi Arabia's military aviation capabilities to enhance Iran's domestic aviation capabilities."

The report by FireEye also said the suspected Iranian hackers left behind a new type of malware that could have been used to destroy the computers it infected, an echo of two other Iran-attributed cyberattacks targeting Saudi Arabia in 2012 and 2016 that destroyed systems.

 APT33 targets organisations by sending spear phishing emails with malicious HTML links to infect targets' computers with malware. The malware used by the espionage group includes DROPSHOT (dropper), SHAPESHIFT (wiper) and TURNEDUP (custom backdoor, which is the final payload).

Kazakhstan Banks hit by massive DDoS attack



According to local media, several banks in the country have faced a massive DDoS(Distributed Denial of Service) attacks over the past few days.

The attack traffic came from several countries at the same time.  As a result, bank websites were unavailable for a certain time. One of the affected bank is HomeBank.

"The bank's specialists recorded yesterday a large-scale DDoS attack in the form of false requests simultaneously from a huge number of IP addresses that block the operation of the portal."  The Homebank posted in the Qazkom's Facebook Page.

"To ensure the protection of the site and your accounts, the bank's specialists take the necessary technical measures to neutralize the actions of hackers, therefore we apologize if there will be delays in conducting operations or the site will be temporarily unavailable." The Bank apologized for the inconvenience.

Kaspi bank said that their servers and services are not affected by the attack. The bank said they are actively monitoring and working to prevent such attacks.  Other Banks including HalykBank, People's Bank also claimed that their servers are not affected by this attack.

Just a few days ago, the Committee of National Security of the Republic of Kazakhstan stated that Banks hide the information about hacker attacks to maintain the Bank's reputation. In 2017, six Banks have suffered a phishing attack, and only one of them asked KNB to help.

- Christina
 

Sonic’s Credit Card Hack Could Affect Millions



Drive-in burger chain in U.S. has confirmed an unusual activity regarding credit cards used as some of its outlets, and it has caused the company's share to tank.

The company said in a statement that their credit card processor had informed them last week about the incident and now they are investigating to  "understand the nature and scope of this issue.”  However, till now they haven't disclosed the details of the hack and its impact.

“We are working to understand the nature and scope of this issue, as we know how important this is to our guests,” the company said in a statement. “We immediately engaged third-party forensic experts and law enforcement when we heard from our processor. While law enforcement limits the information we can share, we will communicate additional information as we are able.

Just after disclosing a breach, the company suffered a worst stock decline in nearly two months.

According to the company's website, Sonic has more than 3,500 restaurants throughout 44 American states. 

Krasnoyarsk Court Sentences Hackers for hacking into travel agencies

The court in Krasnoyarsk has sentenced two hackers from Moscow and Barnaul for hacking into computers of travel agencies and firms.  They used the computer access to sell the railway tickets for different cities of Russia through a front men, who are with them in criminal conspiracy.

They group booked tickets with false names and received digital code.  They took print out of the travel document using the digital code. Then, they applied for ticket cancellation using the document and received money.  The group shared half of the money with the front man and remaining half was transferred to the group.

The court found them guilty under Part 4 of Article 159 of the Criminal Code.  One of the hackers was sentenced to 3 years and another hacker got 2 years and 6 months.

According to the West Siberian transport Prosecutor's office, the group were able to make 1.5 million Rubles(1.6 million Rupees) using this method.

- Christina


Nigerian Central Bank announces plan to issue Cryptocurrency

In a fundamental shift in its stance on cryptocurrencies, The Central Bank of Nigeria (CNB) announced at a cryptocurrency-focused conference in Lagos that it is looking at researching blockchain technology and even introducing its own digital currency. CNB’s deputy director and head of payments system policy and oversight, Musa Jimoh also indicated in his announcement that the bank is preparing a white paper on the subject, reported The Guardian, a Lagos-based, Nigerian-owned newspaper unaffiliated with the British publication of the same name.

It was only January 2017 when CNB issued a notice to financial institutions – including banks – around the country, warning them of virtual currencies and effectively barring them from holding any reserves of virtual currencies. In the same month, Nigeria’s capital's market regulator issued a warning urging the public against investing in cryptocurrencies including bitcoin.

More notably, Jimoh’s comments represent a remarkable admission from a central bank official where he explained the motive behind the decision.

“The CBN cannot stop the tide of waves generated by the blockchain technology and its derivatives. Currently, we have taken measures to create four departments in the institution that are looking forward to harmonise the white paper on Crypto currency.” Such comments carry extra weight coming from the institution that oversees domestic monetary policy as well as banking sector regulation.

In his remarks, Jimoh also noted that the nature of the technology, which gives users autonomy over the private keys that access blockchain-linked data, enables the creation of forms of money that are "beyond restriction and confiscation." The report underlines how the CBN had previously been ‘wary’ of adopting or being open to digital currencies.

Conference attendee and head of Nigeria’s cyberspace watchdog, Information Security Society of Nigeria president Dr David Isiawe opined that Nigerians must accept cryptocurrency whether they like it or not. More specifically, the official called for Nigeria to proactively embrace the decentralized technology in adopting them among wider society.

South African social media users are easy target for hackers: Facebook

Digital literacy among common people is a big concern all over the world, and it is a big challenge for the countries who have poor literacy rate. South Africa is in the top list of hackers due to its poor digital literacy.

Facebook safety policy manager of Europe Middle East and Africa Julie de Bailliencourt said that the social media company is trying to raise awareness among the citizens on how to protect their social media accounts.

De Bailliencourt was in South Africa for a series of seminars on online safety.

De Bailliencourt said that "the Facebook has more than two billion active users around the world and more than 16million active monthly users in South Africa, could only do so much to protect users from being hacked but that education was important for being safe online."

"For hacking, we're trying to raise awareness on not sharing your password with your friends or partner," said De Bailliencourt.

"We can put the best safety mechanisms in place but if you're going to share your password then it undoes a lot of the good practices.

"There's also a huge focus on education, so digital literacy is important."

According to a researcher at the Center for Justice and Crime Prevention, Joanne Phyfer, the research team had found some alarming stats in their recent case study about the South Africans' social media users and had found some astonishing result especially among youth and children.

"A lot of children are meeting strangers on the internet," said Phyfer, while talking in the seminar organized by the Facebook.

"Almost half of them have met someone they don't know, and almost half of those had later met the person offline," she said.

"When we compared parents and children, we found that parents' level of skill was the same as a that of a 12- to 14-year-old child.

"So for a parent to try to manage a child's internet use can be quite difficult, because once the child gets beyond the age of 14 he has progressed beyond the parent's capabilities," Phyfer said.

nRansomware demands your 10 nude photos to unlock your computer


Generally, ransomware are designed to extort money or bitcoin from the victims, but a bunch of turpitude designed a ransomware that ask to send 10 nude images of victims in order to unlock their computers.

The year 2017 is one of the worst in the history of cybersecurity, some old and new ransomware like Locky, Mamba, WannaCry, Petya, and many others hit across the world. A new ransomware dubbed as nRansomware could leave your persona life in dishevel.

Researchers at MalwareHunterTeam, experts in the malicious ransom software, published details of nRansomware on Thursday. The research team  posted a screenshot on Twitter of the meassge that's displayed after someone gets infected by the ransomware.

"Your computer has been locked. You can only unlock it with the special unlock code,” the message reads. "After we reply, you must send at least 10 nude pictures of you. After that we will have to verify that the nudes belong to you.”

Once you get infected by this ransomware it locks your computer, and asks you to create an email ID using @protonmail.com domain name and send a request to unlock the device. After receiving this it will ask you to send 10 nude images.

Hackers will verify and ensure that photos are of the victims, after all the verification they will send the key code to open the computer.

Till now, there is no solution to the nRansomware, but you can improve the security of your computer to avoid being hacked by any kind ransomware.

Email phishing scam targeting Netflix customers’ bank account

A new email scam is targeting Netflix users in order to obtain access to their bank account info, according to multiple reports.

Netflix users should keep their eyes peeled for a sneaky phishing scam that’s attempting to extract user payment information by sending fraudulent billing emails and be sure their account information is secure.

As WGN-TV reports, subscribers have reported receiving fake (yet very official-looking) emails that appear to come from Netflix, informing them that their account has been temporarily disabled due to billing problems. To “reactivate” it, they’re occasionally instructed to update their payment information by clicking on a link that leads them to a fake website. Other times, they’re asked to send these details by email.

“A link in the email takes users to a fake Netflix page, where you are invited to input your bank details. It is realistic and will no doubt catch out a few people whose bank card has just expired,” a user said in a Tuesday letter to the Guardian.

The emails look like they have been sent from the online streaming service, complete with the Netflix logo, according to WGN9.

According to the Netflix help centre website, the company will never ask for personal information to be sent over email, including credit and debit card numbers and passwords.

For the uninitiated, schemes like these are designed to give hackers direct access to your personal banking details and can lead to a case of credit card or identity theft. So if you’ve received a billing email that appears to be from Netflix, take the time to vet it to see if it’s legit. Always check who the sender is by hovering your cursor over their email address, and above all, never click on any links that are included in the message's body. Bad grammar and typos are also a giveaway that some "customer service" emails aren't real.