What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
The_Hackers_News.webp 2024-03-25 17:07:00 Leçon clé du piratage de pulvérisation de mot de passe de Microsoft \\: sécuriser chaque compte
Key Lesson from Microsoft\\'s Password Spray Hack: Secure Every Account
(lien direct)
En janvier 2024, Microsoft a découvert qu'ils étaient les & nbsp; victime d'un hack & nbsp; orchestré par des pirates de blizzard de Midnight à l'état russe (parfois connu sous le nom de Nobelium).Le détail préoccupant de cette affaire est la facilité avec laquelle il était facile de violer le géant du logiciel.Ce n'était pas un hack hautement technique qui a exploité une vulnérabilité zéro-jour & # 8211;Les pirates ont utilisé une simple attaque par pulvérisation de mot de passe pour prendre le contrôle de
In January 2024, Microsoft discovered they\'d been the victim of a hack orchestrated by Russian-state hackers Midnight Blizzard (sometimes known as Nobelium). The concerning detail about this case is how easy it was to breach the software giant. It wasn\'t a highly technical hack that exploited a zero-day vulnerability – the hackers used a simple password spray attack to take control of
Hack Vulnerability Threat Technical ★★
The_Hackers_News.webp 2024-03-09 09:31:00 Microsoft confirme que les pirates russes ont volé le code source, certains secrets des clients
Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets
(lien direct)
Vendredi, Microsoft a révélé que l'acteur de menace soutenu par le Kremlin connu sous le nom de & nbsp; Midnight Blizzard & nbsp; (aka apt29 ou confort) a réussi à accéder à certains de ses référentiels de code source et systèmes internes après A & NBSP; hack qui est venu à la lumière & NBSP; en janvier 2024. "Ces dernières semaines, nous avons vu des preuves que Midnight Blizzard utilise des informations initialement exfiltrées de notre
Microsoft on Friday revealed that the Kremlin-backed threat actor known as Midnight Blizzard (aka APT29 or Cozy Bear) managed to gain access to some of its source code repositories and internal systems following a hack that came to light in January 2024. "In recent weeks, we have seen evidence that Midnight Blizzard is using information initially exfiltrated from our
Hack Threat APT 29 ★★★
The_Hackers_News.webp 2024-03-02 10:08:00 Les États-Unis facturent un piratage iranien, offre une récompense de 10 millions de dollars pour la capture
U.S. Charges Iranian Hacker, Offers $10 Million Reward for Capture
(lien direct)
Vendredi, le ministère américain de la Justice (DOJ) a inauguré un acte d'accusation contre un ressortissant iranien pour sa participation présumée dans une campagne de cyberlativées pluriannuelle conçue pour compromettre les entités gouvernementales et privées américaines. Plus d'une douzaine d'entités auraient été ciblées, notamment les départements américains du Trésor et de l'État, des entrepreneurs de la défense qui soutiennent le Département américain du
The U.S. Department of Justice (DoJ) on Friday unsealed an indictment against an Iranian national for his alleged involvement in a multi-year cyber-enabled campaign designed to compromise U.S. governmental and private entities. More than a dozen entities are said to have been targeted, including the U.S. Departments of the Treasury and State, defense contractors that support U.S. Department of
Hack ★★★
The_Hackers_News.webp 2024-01-11 11:40:00 Le compte mandiant \\ s a été piraté en utilisant une attaque de force brute
Mandiant\\'s X Account Was Hacked Using Brute-Force Attack
(lien direct)
Le compromis du compte X mandiant \\ (anciennement Twitter) la semaine dernière était probablement le résultat d'une "attaque de mot de passe brute-force", attribuant le piratage à un groupe de drainage en tant que service (DAAS). "Normalement, [l'authentification à deux facteurs] aurait atténué cela, mais en raison de certaines transitions d'équipe et d'un changement dans la politique de la 2FA de X \\, nous n'étions pas adéquatement protégés", la société de renseignement sur les menaces & nbsp; a dit & nbsp;
The compromise of Mandiant\'s X (formerly Twitter) account last week was likely the result of a "brute-force password attack," attributing the hack to a drainer-as-a-service (DaaS) group. "Normally, [two-factor authentication] would have mitigated this, but due to some team transitions and a change in X\'s 2FA policy, we were not adequately protected," the threat intelligence firm said 
Hack Threat ★★★
The_Hackers_News.webp 2024-01-04 11:59:00 Compte Twitter de Mandiant \\ a été restauré après un piratage d'escroquerie de cryptographie de six heures
Mandiant\\'s Twitter Account Restored After Six-Hour Crypto Scam Hack
(lien direct)
La société américaine de cybersécurité et la filiale de Google Cloud Mandiant avait son compte X (anciennement Twitter) compromis pendant plus de six heures par un attaquant inconnu pour propager une arnaque de crypto-monnaie. Au cours de la rédaction, le compte & nbsp; a été restauré & nbsp; sur la plate-forme de médias sociaux. Il n'est actuellement pas clair comment le compte a été violé.Mais le compte mandiant piraté a été initialement renommé "@
American cybersecurity firm and Google Cloud subsidiary Mandiant had its X (formerly Twitter) account compromised for more than six hours by an unknown attacker to propagate a cryptocurrency scam. As of writing, the account has been restored on the social media platform. It\'s currently not clear how the account was breached. But the hacked Mandiant account was initially renamed to "@
Hack Cloud ★★★★
The_Hackers_News.webp 2023-12-28 16:49:00 Le hack iPhone le plus sophistiqué a jamais exploité la fonctionnalité matérielle cachée d'Apple \\
Most Sophisticated iPhone Hack Ever Exploited Apple\\'s Hidden Hardware Feature
(lien direct)
Le & nbsp; Operation Triangulation & NBSP; Attaques spyware ciblant les périphériques Apple iOS exploités des exploits sans prévision qui ont permis de contourner les protections de sécurité matérielles pivots érigées par la société. La société russe de cybersécurité Kaspersky, qui & nbsp; découverte & nbsp; le & nbsp; campagne & nbsp; au début de 2023 après être devenue l'une des cibles, & nbsp; décrit & nbsp;
The Operation Triangulation spyware attacks targeting Apple iOS devices leveraged never-before-seen exploits that made it possible to even bypass pivotal hardware-based security protections erected by the company. Russian cybersecurity firm Kaspersky, which discovered the campaign at the beginning of 2023 after becoming one of the targets, described it as
Hack Mobile ★★★
The_Hackers_News.webp 2023-11-10 17:52:00 Des pirates russes Sandworm provoquent une panne de courant en Ukraine au milieu des frappes de missiles
Russian Hackers Sandworm Cause Power Outage in Ukraine Amidst Missile Strikes
(lien direct)
Les pirates russes notoires connus sous le nom de Sandworm ont ciblé une sous-station électrique en Ukraine l'année dernière, provoquant une brève panne de courant en octobre 2022. Les résultats proviennent du mandiant de Google \\, qui a décrit le hack comme une "cyberattaque multi-événements" en tirant parti d'une nouvelle technique pour avoir un impact sur les systèmes de contrôle industriel (CI). "L'acteur a d'abord utilisé
The notorious Russian hackers known as Sandworm targeted an electrical substation in Ukraine last year, causing a brief power outage in October 2022. The findings come from Google\'s Mandiant, which described the hack as a "multi-event cyber attack" leveraging a novel technique for impacting industrial control systems (ICS). "The actor first used OT-level living-off-the-land (LotL) techniques to
Hack Industrial APT 28 ★★★
The_Hackers_News.webp 2023-09-27 16:53:00 Une nouvelle enquête découvre comment les entreprises sont confrontées à des défis de sécurité des données
New Survey Uncovers How Companies Are Confronting Data Security Challenges Head-On
(lien direct)
La sécurité des données est souvent dans les gros titres, et elle n'est presque jamais une raison positive.Les violations majeures, les nouvelles façons de pirater les données supposées sécurisées d'une organisation, et d'autres menaces font la nouvelle parce que bien, c'est effrayant - et coûteux. Les violations de données, les ransomwares et les attaques de logiciels malveillants et d'autres cybercriminats peuvent être chères à prévenir, mais ils sont encore plus coûteux lorsqu'ils se produisent, avec le
Data security is in the headlines often, and it\'s almost never for a positive reason. Major breaches, new ways to hack into an organization\'s supposedly secure data, and other threats make the news because well, it\'s scary - and expensive.  Data breaches, ransomware and malware attacks, and other cybercrime might be pricey to prevent, but they are even more costly when they occur, with the
Ransomware Malware Hack ★★★
The_Hackers_News.webp 2023-09-23 11:42:00 Apple et Chrome Zero-Days exploités pour pirater un ex-MP égyptien avec un logiciel espion prédateur
Apple and Chrome Zero-Days Exploited to Hack Egyptian ex-MP with Predator Spyware
(lien direct)
Les trois défauts zéro-jours adressés par Apple le 21 septembre 2023 ont été exploités dans le cadre d'une chaîne d'exploitation iPhone dans le but de livrer une souche spyware appelée Predator ciblant l'ancien député égyptien Ahmed Eltantawy entre mai et septembre 2023. "Le ciblage a eu lieu après qu'Eltantawy ait publiquement déclaré ses plans pour se présenter à la présidence aux élections égyptiennes de 2024", les
The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit chain in an attempt to deliver a spyware strain called Predator targeting former Egyptian member of parliament Ahmed Eltantawy between May and September 2023. "The targeting took place after Eltantawy publicly stated his plans to run for President in the 2024 Egyptian elections," the
Hack ★★★
The_Hackers_News.webp 2023-08-18 17:19:00 La vulnérabilité de Zero Trust: leçons de la tempête 0558 Hack
The Vulnerability of Zero Trust: Lessons from the Storm 0558 Hack
(lien direct)
Bien que les gestionnaires de sécurité informatique des entreprises et des administrations publiques s'appuient sur le concept de confiance zéro, les APT (menaces persistantes avancées) mettent son efficacité pratique à l'épreuve.Les analystes, en revanche, comprennent que Zero Trust ne peut être réalisé qu'avec un aperçu complet de son propre réseau. Tout récemment, une attaque qui serait perpétrée par le groupe de pirates chinois
While IT security managers in companies and public administrations rely on the concept of Zero Trust, APTS (Advanced Persistent Threats) are putting its practical effectiveness to the test. Analysts, on the other hand, understand that Zero Trust can only be achieved with comprehensive insight into one\'s own network.  Just recently, an attack believed to be perpetrated by the Chinese hacker group
Hack Vulnerability ★★
The_Hackers_News.webp 2023-08-04 17:43:00 Le couple de New York plaide coupable de blanchiment d'argent dans 3,6 milliards de dollars Bitfinex Hack
NYC Couple Pleads Guilty to Money Laundering in $3.6 Billion Bitfinex Hack
(lien direct)
Un couple marié de New York a plaidé coupable à des accusations de blanchiment d'argent dans le cadre du piratage 2016 de la bourse de crypto-monnaie Bitfinex, ce qui a entraîné un vol d'environ 120 000 Bitcoin. Le développement survient plus d'un an après que Ilya Lichtenstein, 35 ans, et son épouse, Heather Morgan, 33 ans, ont été arrêtées en février 2022, à la suite de la crise d'environ 95 000 des volées
A married couple from New York City has pleaded guilty to money laundering charges in connection with the 2016 hack of cryptocurrency stock exchange Bitfinex, resulting in the theft of about 120,000 bitcoin. The development comes more than a year after Ilya Lichtenstein, 35, and his wife, Heather Morgan, 33, were arrested in February 2022, following the seizure of roughly 95,000 of the stolen
Hack ★★
The_Hackers_News.webp 2023-07-29 10:29:00 Les pirates déploient la porte dérobée "sous-marin" dans les attaques de passerelle de sécurité par courriel de Barracuda
Hackers Deploy "SUBMARINE" Backdoor in Barracuda Email Security Gateway Attacks
(lien direct)
Vendredi, l'Agence américaine de sécurité de la cybersécurité et de l'infrastructure (CISA) a révélé que les détails d'une "porte dérobée persistante" appelée sous-marin déployée par des acteurs de la menace en rapport avec le piratage sur les appareils Gateway (ESG) de Hack on Barracuda. "Le sous-marin comprend plusieurs artefacts - y compris un déclencheur SQL, des scripts de coquille et une bibliothèque chargée pour un démon Linux - qui permettent ensemble
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday disclosed details of a "novel persistent backdoor" called SUBMARINE deployed by threat actors in connection with the hack on Barracuda Email Security Gateway (ESG) appliances. "SUBMARINE comprises multiple artifacts - including a SQL trigger, shell scripts, and a loaded library for a Linux daemon - that together enable
Hack Threat ★★
The_Hackers_News.webp 2023-07-25 20:16:00 Des acteurs nord-coréens de l'État-nation exposé à Jumpcloud Hack après l'OPSEC
North Korean Nation-State Actors Exposed in JumpCloud Hack After OPSEC Blunder
(lien direct)
Les acteurs nord-coréens de l'État-nation affiliés au Bureau général de reconnaissance (RVB) ont été attribués au hack de Jumpcloud à la suite d'une erreur de sécurité opérationnelle (OPSEC) qui a exposé leur adresse IP réelle. Le cabinet de renseignement sur les menaces appartenant à Google Mandiant a attribué l'activité à un acteur de menace qu'il suit sous le nom de UNC4899, qui partage probablement les chevauchements avec des clusters déjà
North Korean nation-state actors affiliated with the Reconnaissance General Bureau (RGB) have been attributed to the JumpCloud hack following an operational security (OPSEC) blunder that exposed their actual IP address. Google-owned threat intelligence firm Mandiant attributed the activity to a threat actor it tracks under the name UNC4899, which likely shares overlaps with clusters already
Hack Threat ★★★★
The_Hackers_News.webp 2023-07-20 19:00:00 Des pirates nord-coréens parrainés par l'État soupçonnés de Jumpcloud Supply Chain Attack
North Korean State-Sponsored Hackers Suspected in JumpCloud Supply Chain Attack
(lien direct)
Une analyse des indicateurs de compromis (CIO) associées au hack de Jumpcloud a révélé des preuves pointant vers l'implication des groupes nord-coréens parrainés par l'État, dans un style qui rappelle l'attaque de la chaîne d'approvisionnement ciblant 3CX. Les résultats proviennent de Sentinélone, qui a cartographié l'infrastructure relative à l'intrusion aux modèles sous-jacents.Il vaut la peine de noter
An analysis of the indicators of compromise (IoCs) associated with the JumpCloud hack has uncovered evidence pointing to the involvement of North Korean state-sponsored groups, in a style that\'s reminiscent of the supply chain attack targeting 3CX. The findings come from SentinelOne, which mapped out the infrastructure pertaining to the intrusion to uncover underlying patterns. It\'s worth noting
Hack ★★
The_Hackers_News.webp 2023-07-10 10:50:00 Les pirates volent 20 millions de dollars en exploitant une faille dans les systèmes de paiement de Revolut \\
Hackers Steal $20 Million by Exploiting Flaw in Revolut\\'s Payment Systems
(lien direct)
Les acteurs malveillants ont exploité une faille inconnue dans les systèmes de paiement de Revolut \\ pour voler plus de 20 millions de dollars des fonds de la société au début de 2022. Le développement a été signalé par le Financial Times, citant plusieurs sources anonymes connaissant l'incident.La violation n'a pas été divulguée publiquement. La faille provenait des écarts entre les systèmes américains et européens de Revolut, provoquant des fonds
Malicious actors exploited an unknown flaw in Revolut\'s payment systems to steal more than $20 million of the company\'s funds in early 2022. The development was reported by the Financial Times, citing multiple unnamed sources with knowledge of the incident. The breach has not been disclosed publicly. The fault stemmed from discrepancies between Revolut\'s U.S. and European systems, causing funds
Hack Threat ★★★★
The_Hackers_News.webp 2023-06-24 20:48:00 Twitter Hacker condamné à 5 ans de prison pour 120 000 $ d'escroquerie cryptographique
Twitter Hacker Sentenced to 5 Years in Prison for $120,000 Crypto Scam
(lien direct)
Un citoyen du Royaume-Uni qui a participé à l'énorme hack de juillet 2020 de Twitter a été condamné à cinq ans de prison aux États-Unis. Joseph James O \\ 'Connor (alias Plugwalkjoe), 24 ans, a reçu la peine vendredi dans le district sud de New York, un peu plus d'un mois après avoir plaidé coupable aux plans criminels.Il a été arrêté en Espagne en juillet 2021. La tristement célèbre violation de Twitter a permis au
A U.K. citizen who took part in the massive July 2020 hack of Twitter has been sentenced to five years in prison in the U.S. Joseph James O\'Connor (aka PlugwalkJoe), 24, was awarded the sentence on Friday in the Southern District of New York, a little over a month after he pleaded guilty to the criminal schemes. He was arrested in Spain in July 2021. The infamous Twitter breach allowed the
Hack ★★
The_Hackers_News.webp 2023-06-13 16:09:00 Deux ressortissants russes accusés pour le cerveau du Mt. Gox Crypto Exchange Hack
Two Russian Nationals Charged for Masterminding Mt. Gox Crypto Exchange Hack
(lien direct)
The U.S. Department of Justice (DoJ) has charged two Russian nationals in connection with masterminding the 2014 digital heist of the now-defunct cryptocurrency exchange Mt. Gox. According to unsealed indictments released last week, Alexey Bilyuchenko, 43, and Aleksandr Verner, 29, have been accused of conspiring to launder approximately 647,000 bitcoins stolen from September 2011 through at
The U.S. Department of Justice (DoJ) has charged two Russian nationals in connection with masterminding the 2014 digital heist of the now-defunct cryptocurrency exchange Mt. Gox. According to unsealed indictments released last week, Alexey Bilyuchenko, 43, and Aleksandr Verner, 29, have been accused of conspiring to launder approximately 647,000 bitcoins stolen from September 2011 through at
Hack ★★
The_Hackers_News.webp 2023-06-12 13:56:00 Réinitialisation de mot de passe hack exposé dans la plate-forme de commerce électronique de Honda \\, les données des concessionnaires à risque
Password Reset Hack Exposed in Honda\\'s E-Commerce Platform, Dealers Data at Risk
(lien direct)
Les vulnérabilités de sécurité découvertes dans la plate-forme de commerce électronique de Honda \\ auraient pu être exploitées pour obtenir un accès sans restriction aux informations sensibles du concessionnaire. "Les contrôles d'accès brisés / manquants ont permis d'accéder à toutes les données sur la plate-forme, même lorsqu'ils sont connectés en tant que compte de test", a déclaré le chercheur en sécurité Eaton Zveare dans un rapport publié la semaine dernière. La plate-forme est conçue pour la vente de puissance
Security vulnerabilities discovered in Honda\'s e-commerce platform could have been exploited to gain unrestricted access to sensitive dealer information. "Broken/missing access controls made it possible to access all data on the platform, even when logged in as a test account," security researcher Eaton Zveare said in a report published last week. The platform is designed for the sale of power
Hack ★★
The_Hackers_News.webp 2023-06-01 20:44:00 Le nouveau hack zéro clique cible les utilisateurs iOS avec des logiciels malveillants radiculaires furtifs
New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware
(lien direct)
Une menace persistante avancée auparavant inconnue (APT) vise les appareils iOS dans le cadre d'une campagne mobile sophistiquée et de longue date surnommée la triangulation de l'opération qui a commencé en 2019. "Les cibles sont infectées à l'aide d'exploits de clics zéro via la plate-forme iMessage, et le malware s'exécute avec les privilèges racine, obtenant un contrôle complet sur les données de l'appareil et de l'utilisateur", a déclaré Kaspersky. Le Russe
A previously unknown advanced persistent threat (APT) is targeting iOS devices as part of a sophisticated and long-running mobile campaign dubbed Operation Triangulation that began in 2019. "The targets are infected using zero-click exploits via the iMessage platform, and the malware runs with root privileges, gaining complete control over the device and user data," Kaspersky said. The Russian
Malware Hack Threat ★★
The_Hackers_News.webp 2023-05-10 16:20:00 Mastermind derrière Twitter 2020 Hack plaide coupable et risque jusqu'à 70 ans de prison
Mastermind Behind Twitter 2020 Hack Pleads Guilty and Faces up to 70 Years in Prison
(lien direct)
A U.K. national has pleaded guilty in connection with the July 2020 Twitter attack affecting numerous high-profile accounts and defrauding other users of the platform. Joseph James O\'Connor, who also went by the online alias PlugwalkJoe, admitted to "his role in cyberstalking and multiple schemes that involve computer hacking, including the July 2020 hack of Twitter," the U.S. Department of
A U.K. national has pleaded guilty in connection with the July 2020 Twitter attack affecting numerous high-profile accounts and defrauding other users of the platform. Joseph James O\'Connor, who also went by the online alias PlugwalkJoe, admitted to "his role in cyberstalking and multiple schemes that involve computer hacking, including the July 2020 hack of Twitter," the U.S. Department of
Hack ★★
The_Hackers_News.webp 2023-04-22 12:16:00 Lazarus X_Trader Hack a un impact sur les infrastructures critiques au-delà
Lazarus X_TRADER Hack Impacts Critical Infrastructure Beyond 3CX Breach
(lien direct)
Lazare, le prolifique groupe de piratage nord-coréen derrière l'attaque de la chaîne d'approvisionnement en cascade ciblant 3CX, a également violé deux organisations d'infrastructures critiques dans le secteur de l'énergie et de l'énergie et deux autres entreprises impliquées dans le négociation financière en utilisant l'application X_Trader Trojanisée. Les nouvelles conclusions, qui viennent gracieuseté de l'équipe Hunter Hunter de Symantec \\, confirment les soupçons antérieurs que le
Lazarus, the prolific North Korean hacking group behind the cascading supply chain attack targeting 3CX, also breached two critical infrastructure organizations in the power and energy sector and two other businesses involved in financial trading using the trojanized X_TRADER application. The new findings, which come courtesy of Symantec\'s Threat Hunter Team, confirm earlier suspicions that the
Hack Threat APT 38 ★★
The_Hackers_News.webp 2023-04-04 09:24:00 Les sociétés de crypto-monnaie ciblées dans une attaque sophistiquée de la chaîne d'approvisionnement 3CX
Cryptocurrency Companies Targeted in Sophisticated 3CX Supply Chain Attack
(lien direct)
L'adversaire derrière l'attaque de la chaîne d'approvisionnement ciblant 3CX a déployé un implant de deuxième étape distinguant spécifiquement un petit nombre de sociétés de crypto-monnaie. La société russe de cybersécurité Kaspersky, qui a suivi en interne la porte dérobée polyvalente sous le nom de Gopuram depuis 2020, a déclaré avoir observé une augmentation du nombre d'infections en mars 2023 coïncidant avec la violation du 3CX.
The adversary behind the supply chain attack targeting 3CX deployed a second-stage implant specifically singling out a small number of cryptocurrency companies. Russian cybersecurity firm Kaspersky, which has been internally tracking the versatile backdoor under the name Gopuram since 2020, said it observed an increase in the number of infections in March 2023 coinciding with the 3CX breach.
Hack Threat ★★★
The_Hackers_News.webp 2023-03-08 16:04:00 Lazarus Group Exploits Zero-Day Vulnerability to Hack South Korean Financial Entity (lien direct) The North Korea-linked Lazarus Group has been observed weaponizing flaws in an undisclosed software to breach a financial business entity in South Korea twice within a span of a year. While the first attack in May 2022 entailed the use of a vulnerable version of a certificate software that's widely used by public institutions and universities, the re-infiltration in October 2022 involved the Hack Vulnerability Medical APT 38 ★★★
The_Hackers_News.webp 2023-02-06 17:39:00 Microsoft: Iranian Nation-State Group Sanctioned by U.S. Behind Charlie Hebdo Hack (lien direct) An Iranian nation-state group sanctioned by the U.S. government has been attributed to the hack of the French satirical magazine Charlie Hebdo in early January 2023. Microsoft, which disclosed details of the incident, is tracking the activity cluster under its chemical element-themed moniker NEPTUNIUM, which is an Iran-based company known as Emennet Pasargad. In January 2022, the U.S. Federal Hack ★★
The_Hackers_News.webp 2023-02-01 11:00:00 Hackers Abused Microsoft\'s "Verified Publisher" OAuth Apps to Hack Corporate Email Accounts (lien direct) Microsoft on Tuesday said it took steps to disable fake Microsoft Partner Network (MPN) accounts that were used for creating malicious OAuth applications as part of a malicious campaign designed to breach organizations' cloud environments and steal email. "The applications created by these fraudulent actors were then used in a consent phishing campaign, which tricked users into granting Hack ★★
The_Hackers_News.webp 2023-01-30 15:00:00 Realtek Vulnerability Under Attack: 134 Million Attempts in 2 Months to Hack IoT Devices (lien direct) Researchers are warning about a spike in exploitation attempts weaponizing a critical remote code execution flaw in Realtek Jungle SDK since the start of August 2022. According to Palo Alto Networks Unit 42, the ongoing campaign is said to have recorded 134 million exploit attempts as of December 2022, with 97% of the attacks occurring in the past four months. Close to 50% of the attacks Hack Vulnerability ★★★
The_Hackers_News.webp 2023-01-24 17:28:00 FBI Says North Korean Hackers Behind $100 Million Horizon Bridge Crypto Theft (lien direct) The U.S. Federal Bureau of Investigation (FBI) on Monday confirmed that North Korean threat actors were responsible for the theft of $100 million in cryptocurrency assets from Harmony Horizon Bridge in June 2022. The law enforcement agency attributed the hack to the Lazarus Group and APT38, the latter of which is a North Korean state-sponsored threat group that specializes in financial cyber Hack Threat Medical APT 38 ★★
The_Hackers_News.webp 2022-11-08 17:07:00 U.S. Seizes Over 50K Bitcoin Worth $3.3 Billion Linked to Silk Road Dark Web (lien direct) The U.S. Department of Justice (DoJ) on Monday said it seized 50,676 Bitcoin in November 2021 that was stolen in the 2012 hack of the now-defunct Silk Road dark web marketplace. The bitcoin, which was obtained in 2012 and valued at $3.36 billion when it was discovered last year, is now worth $1.04 billion. Additionally recovered were $661,900 in cash, 25 Casascius coins with an approximate value Hack
The_Hackers_News.webp 2022-11-07 20:54:00 Medibank Refuses to Pay Ransom After 9.7 Million Customers Exposed in Ransomware Hack (lien direct) Australian health insurer Medibank today confirmed that personal data belonging to around 9.7 million of its current and former customers were accessed following a ransomware incident. The attack, according to the company, was detected in its IT network on October 12 in a manner that it said was "consistent with the precursors to a ransomware event," prompting it to isolate its systems, but not Ransomware Hack
The_Hackers_News.webp 2022-10-29 15:55:00 Twilio Reveals Another Breach from the Same Hackers Behind the August Hack (lien direct) Communication services provider Twilio this week disclosed that it experienced another "brief security incident" in June 2022 perpetrated by the same threat actor behind the August hack that resulted in unauthorized access of customer information. The security event occurred on June 29, 2022, the company said in an updated advisory shared this week, as part of its probe into the digital break-in Hack Threat
The_Hackers_News.webp 2022-10-04 12:36:00 Optus Hack Exposes Data of Nearly 2.1 Million Australian Telecom Customers (lien direct) Australian telecom giant Optus on Monday confirmed that nearly 2.1 million of its current and former customers suffered a leak of their personal information and at least one form of identification number as a result of a data breach late last month. The company also said it has engaged the services of Deloitte to conduct an external forensic assessment of the attack to "understand how it Hack Deloitte Deloitte
The_Hackers_News.webp 2022-09-28 10:33:00 Critical WhatsApp Bugs Could Have Let Attackers Hack Devices Remotely (lien direct) WhatsApp has released security updates to address two flaws in its messaging app for Android and iOS that could lead to remote code execution on vulnerable devices. One of them concerns CVE-2022-36934 (CVSS score: 9.8), a critical integer overflow vulnerability in WhatsApp that results in the execution of arbitrary code simply by establishing a video call. The issue impacts the WhatsApp and Hack Vulnerability Guideline
The_Hackers_News.webp 2022-09-27 11:44:00 Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion Scheme (lien direct) The Australian Federal Police (AFP) on Monday disclosed it's working to gather "crucial evidence" and that it's collaborating with overseas law enforcement authorities following the hack of telecom provider Optus. "Operation Hurricane has been launched to identify the criminals behind the alleged breach and to help shield Australians from identity fraud," the AFP said in a statement. The Hack
The_Hackers_News.webp 2022-09-23 19:34:00 Hackers Using Fake CircleCI Notifications to Hack GitHub Accounts (lien direct) GitHub has put out an advisory detailing what may be an ongoing phishing campaign targeting its users to steal credentials and two-factor authentication (2FA) codes by impersonating the CircleCI DevOps platform. The Microsoft-owned code hosting service said it learned of the attack on September 16, 2022, adding the campaign impacted "many victim organizations." The fraudulent messages claim to Hack
The_Hackers_News.webp 2022-09-22 18:42:00 IT Security Takeaways from the Wiseasy Hack (lien direct) Last month Tech Crunch reported that payment terminal manufacturer Wiseasy had been hacked. Although Wiseasy might not be well known in North America, their Android-based payment terminals are widely used in the Asia Pacific region and hackers managed to steal passwords for 140,000 payment terminals. How Did the Wiseasy Hack Happen? Wiseasy employees use a cloud-based dashboard for remotely Hack
The_Hackers_News.webp 2022-09-21 17:51:00 Crypto Trading Firm Wintermute Loses $160 Million in Hacking Incident (lien direct) In what's the latest crypto heist to target the decentralized finance (DeFi) space, hackers have stolen digital assets worth around $160 million from crypto trading firm Wintermute. The hack involved a series of unauthorized transactions that transferred USD Coin, Binance USD, Tether USD, Wrapped ETH, and 66 other cryptocurrencies to the attacker's wallet. The company said that its centralized Hack
The_Hackers_News.webp 2022-09-21 10:54:00 Critical Remote Hack Flaws Found in Dataprobe\'s Power Distribution Units (lien direct) The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday released an industrial control systems (ICS) advisory warning of seven security flaws in Dataprobe's iBoot-PDU power distribution unit product, mostly used in industrial environments and data centers. "Successful exploitation of these vulnerabilities could lead to unauthenticated remote code execution on the Dataprobe Hack Guideline
The_Hackers_News.webp 2022-09-16 08:38:00 Uber Says It\'s Investigating a Potential Breach of Its Computer Systems (lien direct) Ride hailing giant Uber disclosed Thursday it's responding to a cybersecurity incident involving a breach of its network and that it's in touch with law enforcement authorities. The New York Times first reported the incident. The hack is said to have forced the company to take its internal communications and engineering systems offline as it investigated the extent of the breach. Hack Uber
The_Hackers_News.webp 2022-09-01 15:33:00 Infra Used in Cisco Hack Also Targeted Workforce Management Solution (lien direct) The attack infrastructure used to target Cisco in the May 2022 incident was also employed against an attempted compromise of an unnamed workforce management solutions holding company a month earlier in April 2022. Cybersecurity firm Sentire, which disclosed the findings, raised the possibility that the intrusions could be the work of a criminal actor known as mx1r, who is said to be a member of Hack
The_Hackers_News.webp 2022-08-22 07:28:00 Researchers Find Counterfeit Phones with Backdoor to Hack WhatsApp Accounts (lien direct) Budget Android device models that are counterfeit versions associated with popular smartphone brands are harboring multiple trojans designed to target WhatsApp and WhatsApp Business messaging apps. The trojans, which Doctor Web first came across in July 2022, were discovered in the system partition of at least four different smartphones: P48pro, radmi note 8, Note30u, and Mate40, was "These Hack
The_Hackers_News.webp 2022-08-15 22:42:11 Nearly 1,900 Signal Messenger Accounts Potentially Compromised in Twilio Hack (lien direct) Popular end-to-end encrypted messaging service Signal on Monday disclosed the cyberattack aimed at Twilio earlier this month may have exposed the phone numbers of roughly 1,900 users. "For about 1,900 users, an attacker could have attempted to re-register their number to another device or learned that their number was registered to Signal," the company said. "All users can rest assured that Hack
The_Hackers_News.webp 2022-08-11 03:24:07 What the Zola Hack Can Teach Us About Password Security (lien direct) Password security is only as strong as the password itself. Unfortunately, we are often reminded of the danger of weak, reused, and compromised passwords with major cybersecurity breaches that start with stolen credentials. For example, in May 2022, the popular wedding planning site, Zola, was the victim of a significant cybersecurity breach where hackers used an attack known as credential Hack
The_Hackers_News.webp 2022-07-18 07:50:10 Pegasus Spyware Used to Hack Devices of Pro-Democracy Activists in Thailand (lien direct) Thai activists involved in the country's pro-democracy protests have had their smartphones infected with the infamous Pegasus government-sponsored spyware. At least 30 individuals, spanning activists, academics, lawyers, and NGO workers, are believed to have been infected between October 2020 and November 2021, many of whom have been previously detained, arrested and imprisoned for their Hack
The_Hackers_News.webp 2022-07-10 22:43:38 Hackers Used Fake Job Offer to Hack and Steal $540 Million from Axie Infinity (lien direct) The $540 million hack of Axie Infinity's Ronin Bridge in late March 2022 was the consequence of one of its former employees getting tricked by a fraudulent job offer on LinkedIn, it has emerged.  According to a report from The Block published last week citing two people familiar with the matter, a senior engineer at the company was duped into applying for a job at a non-existent company, causing Hack
The_Hackers_News.webp 2022-06-29 23:01:41 North Korean Hackers Suspected to be Behind $100M Horizon Bridge Hack (lien direct) The notorious North Korea-backed hacking collective Lazarus Group is suspected to be behind the recent $100 million altcoin theft from Harmony Horizon Bridge, citing similarities to the Ronin bridge attack in March 2022. The finding comes as Harmony confirmed that its Horizon Bridge, a platform that allows users to move cryptocurrency across different blockchains, had been breached last week. Hack Medical APT 38
The_Hackers_News.webp 2022-06-29 01:29:21 New UnRAR Vulnerability Could Let Attackers Hack Zimbra Webmail Servers (lien direct) A new security vulnerability has been disclosed in RARlab's UnRAR utility that, if successfully exploited, could permit a remote attacker to execute arbitrary code on a system that relies on the binary. The flaw, assigned the identifier CVE-2022-30333, relates to a path traversal vulnerability in the Unix versions of UnRAR that can be triggered upon extracting a maliciously crafted RAR archive. Hack Vulnerability
The_Hackers_News.webp 2022-06-23 19:36:46 Log4Shell Still Being Exploited to Hack VMWare Servers to Exfiltrate Sensitive Data (lien direct) The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with the Coast Guard Cyber Command (CGCYBER), on Thursday released a joint advisory warning of continued attempts on the part of threat actors to exploit the Log4Shell flaw in VMware Horizon servers to breach target networks. "Since December 2021, multiple threat actor groups have exploited Log4Shell on unpatched, Hack Threat
The_Hackers_News.webp 2022-05-24 20:59:02 New Zoom Flaws Could Let Attackers Hack Victims Just by Sending them a Message (lien direct) Popular video conferencing service Zoom has resolved as many as four security vulnerabilities, which could be exploited to compromise another user over chat by sending specially crafted Extensible Messaging and Presence Protocol (XMPP) messages and execute malicious code. Tracked from CVE-2022-22784 through CVE-2022-22787, the issues range between 5.9 and 8.1 in severity. Ivan Fratric of Google Hack
The_Hackers_News.webp 2022-05-19 19:08:09 New Bluetooth Hack Could Let Attackers Remotely Unlock Smart Locks and Cars (lien direct) A novel Bluetooth relay attack can let cybercriminals more easily than ever remotely unlock and operate cars, break open residential smart locks, and breach secure areas. The vulnerability has to do with weaknesses in the current implementation of Bluetooth Low Energy (BLE), a wireless technology used for authenticating Bluetooth devices that are physically located within a close range. Hack Vulnerability
The_Hackers_News.webp 2022-05-06 21:23:05 U.S. Sanctions Cryptocurrency Mixer Blender for Helping North Korea Launder Millions (lien direct) The U.S. Treasury Department on Friday moved to sanction virtual currency mixer Blender.io, marking the first time a mixing service has been subjected to economic blockades. The move signals continued efforts on the part of the government to prevent North Korea's Lazarus Group from laundering the funds stolen from the unprecedented hack of Ronin Bridge in late March. The newly imposed sanctions, Hack Medical APT 38 APT 28 ★★★
Last update at: 2024-04-28 20:08:29
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter