Wednesday, December 8, 2021

Criminal hackers are now going after phone lines, too : NPR

Security providers that focus on digital communications started noticing an uptick in attacks on companies that manage digital phone call services this fall. Odd Andersen/AFP via Getty Images hide caption

Criminal groups have been sending threatening messages in the past couple of months to companies that manage broadband phone services all over the world, promising they'll flood the digital phone lines with traffic and take them offline unless the targets pay a ransom.

logo
Publisher: NPR.org
Date: 2021-12-06
Twitter: @NPR
Reference: (Read more) Visit Source



Google disrupted the Glupteba botnet used to steal personal information and mine cryptocurrency -

The company also worked with Internet infrastructure companies to take down servers used by hackers to control the network, effectively rendering the "botnet" of infected devices unable to receive new commands from their controllers, at least temporarily.

The move comes a day after Microsoft said it had taken down websites associated with what it believed was a China-based hacking group that stole personal information.

Publisher: Washington Post
Date: 2021-12-07T15:00:00.232Z
Twitter: @WashingtonPost
Reference: (Read more) Visit Source



Chinese hackers targeted Southeast Asian nations, researchers say - MarketWatch

BANGKOK — Chinese hackers, likely state-sponsored, have been broadly targeting government and private-sector organizations across Southeast Asia, including those closely involved with Beijing on infrastructure development projects, according to a report released Wednesday by a U.S.

Specific targets included the Thai prime minister's office and the Thai army, the Indonesian and Philippine navies, Vietnam's national assembly and the central office of its Communist Party, and Malaysia's Ministry of Defense, according to the Insikt Group, the threat research division of

logo
Publisher: MarketWatch
Date: 2021-12-08T21:07:00-05:00
Author: Associated Press
Twitter: @marketwatch
Reference: (Read more) Visit Source



Report Says Russian Hackers Haven’t Eased Spying Efforts

On the anniversary of the public disclosure of the SolarWinds intrusions, Mandiant said the hackers associated with Russia’s SVR foreign intelligence agency continued to steal data “relevant to Russian interests” with great effect using novel, stealthy techniques that it

While the number of government agencies and companies hacked by the SVR was smaller this year than last, when some 100 organizations were breached, assessing the damage is difficult, said Charles Carmakal, Mandiant’s chief technical officer. Overall, the impact is quite serious.

logo
Publisher: Claims Journal
Date: 2021-12-07T17:37:36 00:00
Twitter: @cjournal
Reference: (Read more) Visit Source



Microsoft seizes domains used by "highly sophisticated" hackers in China | Ars Technica

Microsoft said it has seized control of servers that a China-based hacking group was using to compromise targets that align with that country's geopolitical interests.

The hacking group, which Microsoft has dubbed Nickel, has been in Microsoft's sights since at least 2016, and the software company has been tracking the now-disrupted intelligence-gathering campaign since 2019.

Publisher: Ars Technica
Author:
Twitter: @arstechnica
Reference: (Read more) Visit Source



Hackers Use Compromised Google Cloud Accounts for Cryptocurrency Mining - CPO Magazine

Google warns that cybercriminals were compromising Google Cloud Platform (GCP) accounts to perform cryptocurrency mining.

Cryptocurrency mining is a resource-intensive activity while mining rewards continue to decline amid rising computational costs. However, Google Cloud customers have access to upgradable computing power at a cost, making their unsecured cloud resources the target cybercriminals.

logo
Publisher: CPO Magazine
Date: 2021-12-07T16:00:00 00:00
Twitter: @cpomagazine
Reference: (Read more) Visit Source



How to Stop Hackers From Turning Your Systems Against You

Conventional security tools typically rely on the hallmarks of historical attacks: building up deny lists for particular file hashes, domains, and other traces of threat encountered in previous threats.

WMI and Powershell
When it comes to delivering malicious payloads to their target, the command-line tools WMI and PowerShell are used most frequently by attackers.

Publisher: Dark Reading
Date: 2021-12-08T22:55:00.000Z
Author: https www darkreading com author oakley cox
Reference: (Read more) Visit Source



"Something's going to happen." Concern mounts about dam targeted by hackers
Publisher: News 12 - The Bronx
Twitter: @News12BX
Reference: (Read more) Visit Source



Hackers infect random WordPress plugins to steal credit cards

Credit card swipers are being injected into random plugins of e-commerce WordPress sites, hiding from detection while stealing customer payment details.

With the Christmas shopping season in full swing, card-stealing threat actors raise their efforts to infect online shops with stealthy skimmers, so administrators ought to remain vigilant.

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment