Ionut Ilascu
Ionut Ilascu
CRITIC
img-contested
N/A
0 reviews
PUBLIC
img-contested
N/A
0 reviews

RECENT ARTICLES

Sort by:
No Rating
Ransomware admin is refunding victims their ransom payments

Ransomware admin is refunding victims their ransom payments

ByAfter recently announcing the end of the operation, the administrator of Ziggy ransomware is now stating that they will also give the money back.It appears that this is a planned move since the admin shared the "good news" a little over a week ago, but gave no details.Ziggy ransomware shut down in early February. In a short announcement, the administrator of the operation said that they were “sad” about what they did and that they “decided to publish all decryption keys.”They followed through the next day, on February 7, offering an SQL file with keys that victims could use to unlock...

Mar 28
Share
Save
Review
No Rating
SolarWinds hackers used 7-Zip code to hide Raindrop Cobalt Strike loader

SolarWinds hackers used 7-Zip code to hide Raindrop Cobalt Strike loader

ByThe ongoing analysis of the SolarWinds supply-chain attack uncovered a fourth malicious tool that researchers call Raindrop and was used for distribution across computers on the victim network.The hackers used Raindrop to deliver a Cobalt Strike beacon to select victims that were of interest and which had already been compromised through the trojanized SolarWinds Orion update.There are currently four pieces of malware identified in the SolarWinds cyberattack, believed to be the work of a :Symantec researchers found the new Raindrop malware on machines compromised through the SolarWinds...

Jan 19
Share
Save
Review
No Rating
OpenWRT Forum user data stolen in weekend data breach

OpenWRT Forum user data stolen in weekend data breach

ByThe OpenWRT forum, a large community of enthusiasts of alternative, open-source operating systems for routers, announced a data breach.Forum administrators posted the announcement in a high-visibility area, explaining what happened and the risks to users stemming from exposing their data.The attack occurred on Saturday, around 04:00 (GMT), when an unauthorized third party gained admin access to and copied a list with details about forum users and related statistical information.The intruder used the account of an OpenWRT administrator. The intruder used the account of an OpenWRT...

Jan 18
Share
Save
Review
No Rating
Hacker used ransomware to lock victims in their IoT chastity belt

Hacker used ransomware to lock victims in their IoT chastity belt

ByThe source code for the ChastityLock ransomware that targeted male users of a specific adult toy is now publicly available for research purposes.Users of the Bluetooth-controlled  chastity device were targets of an attack with this malware last year after security researchers found a vulnerability in the toy that allowed locking it remotely.Qiui Cellmante is a connected sex toy with a companion app to control its locking/unlocking via Bluetooth that is typically managed by someone else than the person wearing the device.In October 2020, researchers at  about a serious vulnerability that...

Jan 9
Share
Save
Review
No Rating
Swatters hijack smart home devices to watch emergency responders

Swatters hijack smart home devices to watch emergency responders

ByWeak credentials and login protections come with the risk of swatting for owners of connected devices with video and voice capabilities, warns the U.S. Federal Bureau of Investigation (FBI).In a recent spate of swatting attacks, perpetrators have hijacked smart gadgets to watch or live stream the bad joke unfolding and engage the responding officers.Swatting originates from prank calls to emergency services. It aims to generate a response from law enforcement and the S.W.A.T. (special weapons and tactics) team against a target.In many cases, swatting is driven by revenge, especially among...

Dec 29
Share
Save
Review
No Rating
Intel leak: 20GB of source code, internal docs from alleged breach

Intel leak: 20GB of source code, internal docs from alleged breach

ByClassified and confidential documents from U.S. chipmaker Intel, allegedly resulting from a breach, have been uploaded earlier today to a public file sharing service.The cache of secret information is 20GB large and comes from an unknown source. It was announced as the first part in a series of Intel leaks.According to , a developer and reverse engineer who received the documents from an anonymous hacker, most of the information is supposed to be protected intellectual property. The developer was told that the information was stolen from Intel in a breach this year."They were given to me...

August 6, 2020
Share
Save
Review
  • Total 6 items
  • 1
OUTLETS
bleepingcomputer.com

bleepingcomputer.com

CRITIC
img-contested
N/A
PUBLIC
img-contested
N/A