Zum Inhalt der Seite gehen

Suche

Beiträge, die mit hacking getaggt sind


Back on my boring post grind to document my learning.

New #Blog post going through a #TryHackMe challenge. This time detecting two different attack types with snort!

https://ligniform.blog/posts/snort-live-attacks/

💜 🌱

#InfoSec #Learning #CyberSecurity #BlueTeam #Hacking


"A hacker claims to have stolen thousands of internal documents with user records and employee data after breaching the systems of Orange Group, a leading French telecommunications operator and digital service provider.

The threat actor published on a hacker forum details about the stolen data after trying to extort the company unsuccessfully.

Orange confirmed the breach to BleepingComputer saying that it occurred on a non-critical application. The company intiated an investigation and is working to minimize the impact of the incident.

According to the threat actor, who uses the alias Rey and is a member of the HellCat ransomware group, the stolen data is mostly from the Romanian branch of the company and includes 380,000 unique email addresses, source code, invoices, contracts, customer and employee information."

https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/

#CyberSecurity #Romania #Orange #Jira #DataBreaches #Hacking


Very excited to join the instrument inventors iii in The Hague for a month. I’m here working on Plastic Echoes, at the heart of which is research into the development of an instrument that plays the sound of microplastic in water. #maker #Hacking #sonification #sensing #instrumentinventors


#DDos continues. And it is kind of sad that to make the website work you need to make the website not work.

#hacking #programming #webdev #blog


"When the Chinese hacker group known as Salt Typhoon was revealed last fall to have deeply penetrated major US telecommunications companies—ultimately breaching no fewer than nine of the phone carriers and accessing Americans' texts and calls in real time—that hacking campaign was treated as a four-alarm fire by the US government. Yet even after those hackers' high-profile exposure, they've continued their spree of breaking into telecom networks worldwide, including more in the US.

Researchers at cybersecurity firm Recorded Future on Wednesday night revealed in a report that they've seen Salt Typhoon breach five telecoms and internet service providers around the world, as well as more than a dozen universities from Utah to Vietnam, all between December and January. The telecoms include one US internet service provider and telecom firm and another US-based subsidiary of a UK telecom, according to the company's analysts, though they declined to name those victims to WIRED."

https://www.wired.com/story/chinas-salt-typhoon-spies-are-still-hacking-telecoms-now-by-exploiting-cisco-routers/

#CyberSecurity #China #SaltTyphoon #StateHacking #USA #BigTelco #Hacking


"Hackers leaked thousands of files from Lexipol, a Texas-based company that develops policy manuals, training bulletins, and consulting services for first responders.

The manuals, which are crafted by Lexipol’s team of public sector attorneys, practitioners, and subject-matter experts, are customized to align with the specific needs and local legal requirements of agencies across the country.

But the firm also faces criticism for its blanket approach to police policies and pushback on reforms.

The data, a sample of which was given to the Daily Dot by a group referring to itself as “the puppygirl hacker polycule,” includes approximately 8,543 files related to training, procedural, and policy manuals, as well as customer records that contain names, usernames, agency names, hashed passwords, physical addresses, email addresses, and phone numbers.

Among the manuals seen by the Daily Dot, agencies include police departments, fire departments, sheriff’s offices, and narcotics units."

https://www.dailydot.com/debug/lexipol-data-leak-puppygirl-hacker-polycule/

#USA #Hacking #Lexipol #DataLeaks #PoliceState


“Video: hacker group Anonymous warns Trump of systemic attacks, calls for mass uprising v fascism”

by Skwawkbox @skwawkbox

“Group says Trump’s and Musk’s open fascism and attacks on state organs is ‘testing the waters’ for all-out control and the enslavement of the working class”

https://skwawkbox.org/2025/02/11/video-hacker-group-anonymous-warns-trump-of-systemic-attacks-calls-for-mass-uprising-v-fascism/

#Press #US #Trump #Fascism #Anonymous #Hacking #Attack #Enslavement #WorkingClass


Zwei wichtige Foren für Cyberkriminelle abgeschaltet

Ermittler haben zwei Internetseiten abgeschaltet, die für Cyberkriminalität genutzt worden sein sollen. Es seien zehn Millionen User registriert gewesen, so das Bundeskriminalamt. Acht Menschen wurden festgenommen.

➡️ https://www.tagesschau.de/wirtschaft/verbraucher/cyberkriminalitaet-ermittlungen-polizei-100.html?at_medium=mastodon&at_campaign=tagesschau.de

#Cyberkriminalität #Hacking #BKA


15-jähriger Hacker manipuliert Schulnoten und Schiffsrouten: Italienischer Schüler dringt in Systeme ein und verändert Mittelmeer-Routen von Frachtschiffen. Polizei ermittelt. #Cybersecurity #Hacking https://winfuture.de/news,148281.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia


Barcelona: hub de empresas israelitas en ciberseguridad ofensiva. https://www.eldiario.es/catalunya/barcelona-nueva-base-operaciones-piratas-informaticos-israelies_1_11929717.amp.html #Barcelona #israel #ciberseguridad #Hacking #ciberespionaje


"Barcelona has become the cyber offensive capital of Europe, and Haaretz has learned that at least three teams of Israeli researchers focused on facilitating advanced hacking capabilities have relocated to the Catalonian capital in the past year and a half, the latest of them in recent months.
Haaretz Podcast

"There are roughly six such groups of Israelis who are the elite in the field – and half of them have moved to Spain," says an industry executive.

In the past two months, a team of Israeli vulnerability researchers - an industry term for hackers specializing in identifying weaknesses in digital defenses, known as "exploits" - arrived in Barcelona from Singapore. The team specializes in finding breaches in smartphone defenses through which spyware can be remotely installed."

https://www.haaretz.com/israel-news/security-aviation/2024-12-26/ty-article/.premium/israeli-hackers-flock-to-barcelona-as-spyware-industry-shifts/00000193-fec4-df5b-a9b3-fec5d9dc0000

#Israel #CyberSecurity #Hacking #Spyware #Spain #Barcelona


"U.S. government agencies legally hack into cell phones or emails all the time: think of the FBI wiretapping a suspected drug lord or the NSA monitoring emails for terrorism plots.

But now there’s rising interest in hacking other kinds of devices people use, like Wi-Fi-connected security cameras and other IoT products.

Toka, an Israeli startup backed by Andreessen Horowitz, specializes in this type of work. It previously gained attention for a 2022 Haaretz article detailing its claims about being able to obtain and even delete security camera footage.

The company is now looking to hire a “Client Director USA” to “support new business growth within the US government market.” The position requires a “strong history of technology sales within DoD and national security agencies.”"

https://techcrunch.com/2024/12/06/a16z-backed-toka-wants-to-help-us-agencies-hack-into-security-cameras-and-other-iot-devices/

#USA #Surveillance #PoliceState #StateHacking #Hacking #CyberSecurity #IoT


Spiders are somehow hacking Fireflies to lure more Victims.

What happens when an unfortunate bug ends up in a spider’s web? It gets bitten & wrapped in silk and becomes a meal. But if the web belongs to an orb-weaver and the bug is a male firefly, it seems the trapped firefly (once bitten) ends up imitating a female’s flash pattern & luring other males to their doom.

https://newatlas.com/biology/spiders-hack-fireflies-attract-webs/

#spider #firefly #hacking #nature #science #media #tech #news
Fireflies communicate with flash patterns (something you can experiment with yourself using nothing more than a green LED) and males looking to mate will fly around flashing a multi-pulse pattern with their two light-emitting lanterns. Females will tend to remain in one place and flash single-pulse patterns on their one lantern.

When a male spots a female, they swoop in to mate. Spiders have somehow figured out a way to actively take advantage of this, not just inserting themselves into the process but actively and masterfully manipulating male fireflies, causing them to behave in a way they would normally never do. All with the purpose of subverting firefly behavior for their own benefit.
[ImageSource: Newatlas]

It all started with an observation that almost all fireflies in webs were male, and careful investigation revealed it’s not just some odd coincidence. When spiders are not present, the male fireflies don’t act any differently. When a spider is present and detects a male firefly, the spider wraps and bites the firefly differently than other insects. It’s unknown exactly what happens, but this somehow results in the male firefly imitating a female’s flash patterns. Males see this and swoop in to mate, but with a rather different outcome than expected.

The research paper contains added details but it’s clear that there is more going on in this process than meets the eye. Spiders are already fascinating creatures (we’ve seen an amazing eye-tracking experiment on jumping spiders) and it’s remarkable to see this sort of bio-hacking going on under our very noses.


Earlier this year, we reported on how a former employee said #Microsoft dismissed his warnings about a critical flaw because it feared losing #government business. #Russian hackers later used the weakness to breach the National Nuclear Security Administration, among others.

https://www.propublica.org/article/microsoft-solarwinds-golden-saml-data-breach-russian-hackers

#Tech #News #Cybersecurity #Hacking #Data #Technology


"A lawyer who was allegedly hacked with government-grade spyware made by the infamous surveillance tech maker NSO Group has filed a complaint in court against two of the company’s founders and one executive. It appears to be the first attempt to hold the people behind a spyware company accountable for hacking crimes, rather than just the company itself.

On Wednesday, the Barcelona-based human rights nonprofit Iridia announced that it had filed a complaint in a Catalan court earlier this week accusing NSO’s founders Omri Lavie and Shalev Hulio, as well as Yuval Somekh, an executive of two affiliate companies, of hacking crimes.

Iridia represents lawyer Andreu Van den Eynde, an attorney and university professor who specializes in cybersecurity. According to a 2022 investigation by Citizen Lab, a nonprofit that has been investigating government spyware for more than a decade, Van den Eynde was among the victims of a wide-ranging hacking campaign against at least 65 Catalans linked to the region’s attempts to become independent from Spain, which was carried out using NSO’s Pegasus software. Amnesty International independently confirmed Citizen Lab’s findings."

https://techcrunch.com/2024/11/13/lawyer-allegedly-hacked-with-spyware-names-nso-founders-in-lawsuit/

#CyberSecurity #NSOGroup #Pegasus #Spyware #Spain #Hacking


"On Monday Amazon confirmed a breach of employee data which was published on a crime-focused forum, according to a statement from Amazon to 404 Media.

The data includes the employees’ name, work contact information, and what location they work at, and has more than 2.8 million lines of data, according to the post on Breach Forums. The post says the source of the data was MOVEit, which is suite of cloud data management tools.

“Amazon and AWS systems remain secure, and we have not experienced a security event. We were notified about [a] security event at one of our property management vendors that impacted several of its customers including Amazon. The only Amazon information involved was employee work contact information, for example work email addresses, desk phone numbers, and building locations,” an Amazon spokesperson told 404 Media in an email."

https://www.404media.co/amazon-confirms-breach-of-employee-data/

#Amazon #DataBreach #DataProtection #Privacy #Hacking #CyberSecurity


A cyberattack on payment systems blocked cards readers across stores and gas stations in #Israel
https://securityaffairs.com/170823/hacking/cyberattack-payment-systems-israel.html
#securityaffairs #hacking #iphone


"The FBI is warning that hackers are obtaining private user information — including emails and phone numbers — from U.S.-based tech companies by compromising government and police email addresses to submit “emergency” data requests.

The FBI’s public notice filed this week is a rare admission from the federal government about the threat from fraudulent emergency data requests, a legal process designed to help police and federal authorities obtain information from companies to respond to immediate threats affecting someone’s life or property. The abuse of emergency data requests is not new, and has been widely reported in recent years. Now, the FBI warns that it saw an “uptick” around August in criminal posts online advertising access to or conducting fraudulent emergency data requests, and that it was going public for awareness.

“Cyber-criminals are likely gaining access to compromised US and foreign government email addresses and using them to conduct fraudulent emergency data requests to US based companies, exposing the personal information of customers to further use for criminal purposes,” reads the FBI’s advisory."

https://techcrunch.com/2024/11/08/fbi-says-hackers-are-sending-fraudulent-police-data-requests-to-tech-giants-to-steal-peoples-private-information/

#USA #CyberSecurity #FBI #Hacking #Privacy #DataProtection #DataBreaches


Checking your own phone for signs of compromise is easy using Amnesty International Security Lab's Mobile Verification Toolkit. Here's how iPhone users can do it now:

https://scidsg.medium.com/how-to-check-your-iphone-for-pegasus-338bafb2358e

#threatmodel #security #iPhone #hacking #phishing #amnesty #journalism #opensource #press #law