Tag: hacker
-
Namibia’s state telecom provider says hackers leaked data after it refused to pay ransom
by
in SecurityNewsThe company didn’t specify what kind of data was stolen by the cybercriminals, but according to local media reports, the hackers accessed over 400,000 files, including personal and financial data belonging to some high-ranking government officials and Telecom Namibia’s clients.]]> First seen on therecord.media Jump to article: therecord.media/namibia-state-telecom-provider-data-leaked-after-ransom-refusal
-
Hackers seek ransom after getting SSNs, banking info from state gov’t portal
by
in SecurityNewsRhode Island said it’s being extorted after hack of Deloitte-run benefits system. First seen on arstechnica.com Jump to article: arstechnica.com/tech-policy/2024/12/hackers-infiltrate-rhode-island-benefits-portal-forcing-state-to-shut-it-down/
-
Rhode Island Benefits and Services Systems Hit by Ransomware
by
in SecurityNewsHackers likely stole personal information such names, addresses, and SSNs in a ransomware attack on Rhode Island’s human services systems and are threatening to release the data as state and federal officials and Deloitte scrambling to mitigate the data breach. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/rhode-island-benefits-and-services-systems-hit-by-ransomware/
-
Hackers Abuse Google Ads To Attacking Graphic Design Professionals
Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals, as the actor has launched at least 10 malvertising campaigns hosted on two specific IP addresses: 185.11.61[.]243 and 185.147.124[.]110, where these malicious ads, when clicked, redirect users to websites that initiate malicious downloads. Two IP addresses, 185.11.61.243 and 185.147.124.110, have been…
-
Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls
by
in SecurityNews
Tags: attack, cctv, control, cyber, cyberattack, exploit, firewall, hacker, infrastructure, iot, iran, malware, router, vulnerabilityRecent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in Israel and the US, have been attributed to the Iranian-backed CyberAv3ngers. The attacks, leveraging a custom-built malware named IOCONTROL, exploit vulnerabilities in IoT and OT devices, such as routers, PLCs, HMIs, and firewalls. The malware, designed to operate on various platforms,…
-
Hackers Exploiting Apache Struts2 Vulnerability to Upload Malicious Payloads
by
in SecurityNewsHackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used open-source framework for developing Java web applications. The vulnerability, assigned the identifier CVE-2024-53677, has a critical CVSS score of 9.5, indicating its potential for severe impact if left unaddressed. Background on the Vulnerability Apache Struts2 announced the vulnerability last week, highlighting…
-
SAP-Systeme geraten zunehmend ins Visier von Cyber-Angreifern
by
in SecurityNews
Tags: access, authentication, china, cve, cyber, cybercrime, dark-web, exploit, hacker, intelligence, Internet, ransomware, sap, siem, update, vulnerability, zero-daywidth=”5000″ height=”2813″ sizes=”(max-width: 5000px) 100vw, 5000px”>Angriffe auf SAP-Systeme versprechen Hackern fette Beute. ShutterstockEin Rückblick auf Bedrohungsdaten aus den zurückliegenden vier Jahren macht deutlich, dass immer mehr Cyberkriminelle SAP-Systeme ins Visier nehmen. Das berichtete Yvan Genuer, leitender Sicherheitsforscher bei Onapsis auf der Black Hat Europe, die vom 9. bis 12. Dezember 2024 in London stattfand. Demzufolge…
-
Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets
by
in SecurityNewsDigital license plates sold by Reviver, already legal to buy in some states and drive with nationwide, can be hacked by their owners to evade traffic regulations or even law enforcement surveillance. First seen on wired.com Jump to article: www.wired.com/story/digital-license-plate-jailbreak-hack/
-
Security leaders top 10 takeaways for 2024
by
in SecurityNews
Tags: access, ai, attack, automation, best-practice, breach, business, ciso, cloud, compliance, corporate, crowdstrike, cybercrime, cybersecurity, data, deep-fake, detection, email, finance, fraud, governance, group, guide, hacker, identity, incident response, infosec, ISO-27001, office, okta, phishing, privacy, programming, regulation, risk, risk-management, saas, security-incident, service, software, startup, strategy, technology, threat, tool, training, vulnerabilityThis year has been challenging for CISOs, with a growing burden of responsibility, the push to make cybersecurity a business enabler, the threat of legal liability for security incidents, and an expanding attack landscape.As the year comes to a close, CISOs reflect on some of the takeaways that have shaped the security landscape in 2024.…
-
Hackers Hack Hackers: MUT-1244 Steals Credentials in Deceptive GitHub Attack
by
in SecurityNewsAccording to Datadog Security Labs, a cybercriminal group known as MUT-1244 has launched a sophisticated attack campaign that successfully compromised not only regular users but also other hackers and security... First seen on securityonline.info Jump to article: securityonline.info/hackers-hack-hackers-mut-1244-steals-credentials-in-deceptive-github-attack/
-
Winnti hackers target other threat actors with new Glutton PHP backdoor
The Chinese Winnti hacking group is using a new PHP backdoor named ‘Glutton’ in attacks on organizations in China and the U.S., and also in attacks on other cybercriminals. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/winnti-hackers-target-other-threat-actors-with-new-glutton-php-backdoor/
-
390,000 WordPress accounts stolen from hackers in supply chain attack
by
in SecurityNewsA threat actor tracked as MUT-1244 has stolen over 390,000 WordPress credentials in a large-scale, year-long campaign targeting other threat actors using a trojanized WordPress credentials checker. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/390-000-wordpress-accounts-stolen-from-hackers-in-supply-chain-attack/
-
Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques
by
in SecurityNewsThai government officials have emerged as the target of a new campaign that leverages a technique called DLL side-loading to deliver a previously undocumented backdoor dubbed Yokai.”The target of the threat actors were Thailand officials based on the nature of the lures,” Nikhil Hegde, senior engineer for Netskope’s Security Efficacy team, told The Hacker News.…
-
Hackers Steal 17M Patient Records in Attack on 3 Hospitals
by
in SecurityNewsIT Outage, Downtime Procedures Affecting Services at California Healthcare Provider. Cybercriminals claim they stole 17 million patient records from a southern California regional healthcare provider that is still struggling with IT and phone systems outages that have been disrupting patient care since the organization was hit by a ransomware attack on Dec. 1. First seen…
-
Yearlong supply-chain attack targeting security pros steals 390K credentials
by
in SecurityNewsMultifaceted, high-precision campaign targets malicious and benevolent hackers alike. First seen on arstechnica.com Jump to article: arstechnica.com/security/2024/12/yearlong-supply-chain-attack-targeting-security-pros-steals-390k-credentials/
-
Hacker Uses Info-Stealer Against Security Pros, Other Bad Actors
by
in SecurityNewsAn unknown hacker called MUT-1244 used information-stealing malware to not only grab sensitive data from cybersecurity professionals but also to steal WordPress credentials from other bad actors who had bought them on the dark web. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/hacker-uses-info-stealer-against-security-pros-other-bad-actors/
-
Analysis: AI-Powered Cyberattacks Are Here, But Real Threat Is Still Humans With A Keyboard
by
in SecurityNewsCrowdStrike’s Adam Meyers says manual attacks from hackers remain a massive problem for organizations even in the era of AI-driven cyberattacks. First seen on crn.com Jump to article: www.crn.com/news/security/2024/analysis-ai-powered-cyberattacks-are-here-but-real-threat-is-still-humans-with-a-keyboard
-
Germany cuts hacker access to 30,000 devices infected with BadBox malware
Germany’s Federal Office for Information Security (BSI) blocked communication between the infected devices, which are typically Android products such as smartphones, tablets and streaming boxes sold through online retailers or resale sites, and the criminals’ control servers.]]> First seen on therecord.media Jump to article: therecord.media/germany-hacker-access-malware-cut
-
Japanese game and anime publisher reportedly pays $3 million ransom to Russia-linked hackers
by
in SecurityNewsKadokawa, known for manga, anime and video games, appears to have made an extortion payment to cybercriminals, according to Kyodo News.]]> First seen on therecord.media Jump to article: therecord.media/kadokawa-japan-reported-ransomware-payment
-
Bitcoin ATM Giant Byte Federal Hit by Hackers, 58,000 Users Impacted
by
in SecurityNewsSUMMARY Byte Federal, the US’s largest Bitcoin ATM operator offering around 1,200 Bitcoin ATMs across the country, recently… First seen on hackread.com Jump to article: hackread.com/bitcoin-atm-byte-federal-hackers-users-impacted/
-
Hackers Possibly Stole Personal Data From Bitcoin ATM Operator Byte Federal
Byte Federal says the personal information of 58,000 was compromised after a GitLab flaw allowed attackers to access a server. The post Hackers Possibly Stole Personal Data From Bitcoin ATM Operator Byte Federal appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/hackers-possibly-stole-personal-data-from-bitcoin-atm-operator-byte-federal/
-
Iranian Hackers Use IOCONTROL Malware to Target OT, IoT Devices in US, Israel
The Iranian threat group CyberAv3ngers has used custom-built malware named IOCONTROL to target IoT and OT devices in the US and Israel. The post Iranian Hackers Use IOCONTROL Malware to Target OT, IoT Devices in US, Israel appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/iranian-hackers-use-iocontrol-malware-to-target-ot-iot-devices-in-us-israel/
-
Bitcoin ATM giant Byte Federal says 58K users’ personal data compromised in breach
by
in SecurityNewsByte Federal, one of the largest Bitcoin ATM operators in the U.S., said the personal data of thousands of customers may have been compromised during a recent breach. In a filing with Maine’s attorney general, Florida-based Byte Federal said hackers tried to access the data of 58,000 customers, including names, addresses, phone numbers, government-issued IDs,…
-
Russia Used Borrowed Spyware to Target Ukrainian Troops
by
in SecurityNewsSecret Blizzard Used Third-party Amadey Bots to Hack Ukrainian Military Devices. A Russian state-backed hacker group used third-party data-stealing bots and possibly a backdoor used by another Russia-based threat group to infiltrate and spy on devices used by frontline Ukrainian military units, according to a report from the Microsoft threat intelligence team. First seen on…
-
Chinese hacker compromised 81K devices via zero-day in Sophos software
First seen on scworld.com Jump to article: www.scworld.com/news/chinese-hacker-compromised-81k-devices-via-zero-day-in-sophos-software