TechDesk, to Cybersecurity
@TechDesk@flipboard.social avatar

The operations of one of the world's most notorious cybercrime gangs has been disrupted by a group of international law enforcement agencies. TechCrunch has the details:

https://flip.it/SMkUAD

#Cybersecurity #Cybercrime #OnlineSecurity #Ransomware

br00t4c, to Law
@br00t4c@mastodon.social avatar

LockBit digital gang disrupted by international law enforcement in 'Operation Cronos'

#cybercrime #law

https://www.cbc.ca/news/world/lockbit-hackers-fbi-ransomware-cronos-1.7119651?cmp=rss

TechDesk, to tech
@TechDesk@flipboard.social avatar

Cybercrime became a $1 billion industry in 2023, according to data from crypto-forensics startup Chainalysis, as exorbitant ransom demands rose right along with increasingly extreme hacking tactics. From Tech Crunch, here’s why ransomware gangs are making so much money — and the glimmer of good news for the near future. https://flip.it/lTMrQq
#Tech #Technology #Cybercrime #Ransomware

cappy, to infosec
@cappy@fedi.fyralabs.com avatar

im getting really tired... -w-

summary of today:

someone on a Japanese hacker forum decided it was a good idea to spam the entire Fediverse because they wanted to cancel a minor that DDoSed a Discord bot which apparently made them lost millions (what?)

A Discord bot. I can't make this shit up man.

The real culprit seems to be someone who goes by mumei in the ctkpaarr.org forums, whose first post was literally a threat to ap12, that if they don't delete their "Kuroneko Server" Discord bot, they will spam every blog, forum and SNS and cancel him.

This shit is ridiculous.

The ap12 account from mastodon-japan was actually fake, and this dude impersonated a minor to get all of the Fediverse (us) to bully him.

The forum admins didn't even stop this. Why? lulz apparently.

cappy, to infosec
@cappy@fedi.fyralabs.com avatar
br00t4c, to DarkWeb
@br00t4c@mastodon.social avatar

Cutting kids off from the dark web - the solution can only ever be social

https://go.theregister.com/feed/www.theregister.com/2024/02/16/dark_web_kids_limit_uk/

cappy, to random
@cappy@fedi.fyralabs.com avatar

There's currently an incident involving some kind of Japanese skids who call themselves the "Kuroneko" organization.

They seem to be attempting to commit DDoS attacks on Misskey servers, constantly creating new accounts on compromised instances and spamming advertisements for their hacking services.

Admins who are federating with these compromised servers, while they might not get compromised themselves, may be affected by the sheer amount of traffic volume from their spam.

Admins are advised to #fediblock or temporarily stop sending requests to affected servers for now, if they don't want to get secondhand DoS'd

IMO I never expected them to be Japanese out of all things, kinda funny. They also host VOICEROID and VOICEVOX TTS bots on their Discord apparently. Kinda a weird flex I guess.

But yeah, probably just a bunch of skids.
#fediblock #fediadmin #fedadmins #mastodadmin #misskeyadmin

cappy,
@cappy@fedi.fyralabs.com avatar
rohad, to Facebook
@rohad@fosstodon.org avatar
YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar
YourAnonRiots, to random Japanese
@YourAnonRiots@mstdn.social avatar
itnewsbot, to Cybersecurity
@itnewsbot@schleuss.online avatar

Massive data breach in France affects 33 million citizens - A massive security breach has been confirmed with almost one in two French citizen... - https://readwrite.com/massive-data-breach-in-france-affects-33-million-citizens/ #dataandsecurity #cybersecurity #cybercrime

br00t4c, to Futurology
@br00t4c@mastodon.social avatar
YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

U.S. Justice Department cracks down on #cybercrime, seizing infrastructure used to sell the notorious "Warzone RAT" and arresting two individuals involved in its distribution and support.

https://thehackernews.com/2024/02/us-doj-dismantles-warzone-rat.html

#cyberattack #malware #cybersecurity

emselimahmed, to Cybersecurity

These are threat-to-life crimes': Hospitals facing rise in ransomware attacks

https://emtech-bd.blogspot.com/2024/02/life-threatening-cyber-crimes.html

#crimes #cybercrime #CyberSecurity #hospital #Ransomware

APC, to Cybersecurity
@APC@mastodon.social avatar

Organisations urge governments to consider withholding support for the draft #UNCybercrime treaty.

If adopted without major changes, this treaty's risks far outweigh its potential benefits.

https://www.apc.org/en/node/39192/

#Cybercrime #Cybersecurity

simontsui, to macos

BitDefender identified a MacOS backdoor written in Rust that has possible link to ALPHV/BlackCat ransomware group. "Specifically, three out of the four command and control servers have been previously associated with ransomware campaigns targeting Windows clients. ALPHV/BlackCat is a ransomware family (also written in Rust), that first made its appearance in November 2021, and that has pioneered the public leaks business model." IOC provided.
🔗 https://www.bitdefender.com/blog/labs/new-macos-backdoor-written-in-rust-shows-possible-link-with-windows-ransomware-group/

simontsui, to random

Check Point highlights the persistent threat of malicious Word/Excel Documents (maldocs):

  • Old Vulnerabilities Still Pose Risks: Despite being several years old, CVEs from 2017 and 2018 in Microsoft Word and Excel remain active threats in the cybersecurity landscape. Examples include CVE-2017-11882, CVE-2017-0199, and CVE-2018-0802.
  • Widespread Use by Cybercriminals: These vulnerabilities are exploited by well-known malware such as GuLoader, Agent Tesla, Formbook, and others. APT groups also got on the list, with Gamaredon APT being a notable example. They target lucrative sectors like finance, government, and healthcare, indicating a strategic approach by attackers.
  • Challenges in Detection: Despite their age, these MalDocs can evade detection due to their sophisticated construction and the use of various tricks to bypass security measures.

🔗 https://blog.checkpoint.com/security/maldocs-in-word-and-excel-a-persistent-cybersecurity-challenge/

simontsui, to random

Recorded Future has an 18 page report on Ransomware Exploitation of vulnerabilities for the past six years (2017). Here are the key findings:

  • Ransomware groups alone in exploiting three or more vulnerabilities exhibit a clear targeting focus, which defenders can use to prioritize security measures. For example, CL0P has uniquely and infamously focused on file transfer software from Accellion, SolarWinds, and MOVEit. Other ransomware groups with high levels of unique exploitation exhibit similar patterns.
  • All of the vulnerabilities ransomware groups have targeted most widely are in software frequently used by major enterprises and can be easily exploited via penetration testing modules or single lines of curl code. These vulnerabilities are ProxyShell (CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207), ZeroLogon (CVE-2020-1472), Log4Shell (CVE-2021-44228), CVE-2021-34527, and CVE-2019-19781.
  • Vulnerabilities requiring unique or custom vectors to exploit (for example, malicious files using particular forms of compression) are more likely to be exploited by only one or two groups.
  • Ransomware operators and affiliates are highly unlikely to discuss specific vulnerabilities, but the cybercriminal ecosystem that supports them has discussed publicly known vulnerabilities andproducts as targets of interest for exploitation

🔗 https://www.recordedfuture.com/patterns-targets-ransomware-exploitation-vulnerabilities-2017-2023

itnewsbot, to cryptocurrency
@itnewsbot@schleuss.online avatar

Cyber security agency warns this WordPress widget might leak data - A WordPress crypto widget used by thousands could contain a security vulnerability... - https://readwrite.com/security-cyber-agency-warns-this-wordpress-widget-might-leak-data/ #dataandsecurity #cryptocurrency #cybersecurity #cybercrime #wordpress #news

itnewsbot, to Cybersecurity
@itnewsbot@schleuss.online avatar

Chinese hackers Volt Typhoon had critical US infrastructure access for 5 years - The Cybersecurity & Infrastructure Security Agency, National Security Agency, ... - https://readwrite.com/chinese-hackers-have-had-critical-infrastructure-access-for-five-years/ #dataandsecurity #cybersecurity #cybercrime #hack #news

br00t4c, to security
@br00t4c@mastodon.social avatar
RonaldTooTall, to Cybersecurity

Verizon Communications is warning that an insider data breach impacts almost half its workforce, exposing sensitive employee information.

https://www.bleepingcomputer.com/news/security/verizon-insider-data-breach-hits-over-63-000-employees/
#Verizon #DataBreach #CyberSecurity #CyberCrime #Breach

br00t4c, to random
@br00t4c@mastodon.social avatar
pitrh, to random
@pitrh@mastodon.social avatar

PROTIP: If you run a "cloud mapping experiment", make sure the contact address you give is deliverable -

2a05:d01c:b43:8a10:36c:5dc5:25e5:de22 - - [07/Feb/2024:18:06:02 +0100] "\x16\x03\x01\x00\xB1\x01\x00\x00\xAD\x03\x03\x9C\xB9\x0F\x1FW`\xF4\xAE\x01\xC5\xAC\x12\xDF9\xC2\xA0\x16\x9B\xBCl\xDE\xFFj4e>Z\x11\x17~g#\x00\x00P\xC0/\xC0+\xC0\x11\xC0\x07\xC0\x13\xC0\x09\xC0\x14\xC0" 400 150 "-" "-"
2a05:d01c:b43:8a10:36c:5dc5:25e5:de22 - -
1/2

pitrh,
@pitrh@mastodon.social avatar

[07/Feb/2024:18:09:02 +0100] "GET /manage/account/login HTTP/1.1" 301 162 "-" "'Cloud mapping experiment. Contact research@pdrlabs.net'"

And certainly when you also throw binary junk at webservers and grope "login" URLs. 2/2

simontsui, to Facebook

Trustwave discovered Ov3r_Stealer, an infostealer distributed using Facebook advertising and phishing emails. Their report provides an in-depth dive into Ov3r_Stealer, exposing what the Threat Hunt team learned about the threat actors, their techniques, tactics, and procedures and how the malware functions. Observed IOC listed.

🔗 https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/trustwave-spiderlabs-uncovers-ov3r_stealer-malware-spread-via-phishing-and-facebook-advertising/

#Ov3r_Stealer #cybercrime #facebook #threatintel #IOC #Trustwave

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines