6.5 C
London
Wednesday, January 22, 2020
Home Cyber Attack

Cyber Attack

Cyber Attack

Insecure Internet-connected devices have aided different types of cybercrime for years, most common being DDoS and spam campaigns. But cybercriminals have now shifted toward a profitable scheme where botnets do not just launch DDoS or spam—they mine cryptocurrencies as well. Smominru, an infamous cryptocurrency-mining...
The United States Treasury Department on Friday announced sanctions against three state-sponsored North Korean hacking groups for conducting several destructive cyberattacks on US critical infrastructure. Besides this, the hacking groups have also been accused of stealing possibly hundreds of millions of dollars from financial...
The Guardian's SecureDrop whistleblower submission site was targeted with a phishing page the attempted to harvest the unique "code names" for sources who submitted information using the service. SecureDrop is a service that media organizations can install on the Tor network in order...
Twitter today finally decided to temporarily disable a feature, called 'Tweeting via SMS,' after it was abused by a hacking group to compromise Twitter CEO Jack Dorsey last week and sent a series of racist and offensive tweets to Dorsey's followers. Dorsey's Twitter account...
Victims are being asked to download malware through visually-compelling fake update prompts Hackers are regularly using highly customisable online resources to add social engineering components to render their attacks more effective, according to new research from Malwarebytes. One website identified by the team features...
A new malicious Android remote access tool (RAT) called BRATA was reported by Kaspersky researchers, has infectedand spy from WhatsApp and SMS messages to Brazilian users. “BRATA” is a new Android remote access tool malware family. We used this code name based on its description – “Brazilian...
A new Trojan dropper dubbed xHelper was observed while slowly but steadily spreading to more and more Android devices since May, with over 32,000 smartphones and tablets having been found infected in the last four months. Trojan droppers are tools used by threat actors...
A computer hacker found with the personal data of about 165,000 people and described as a "one man cyber crime wave" has been jailed. Grant West, 26, from Sheerness in Kent, sent "phishing" emails pretending to be from Just Eat and extracted the details...
Cyber criminals are directly selling stolen data in the underground markets New Delhi: In a startling revelation, US-based cyber security firm FireEye said on Thursday that hackers broke into a leading India-based healthcare website, stealing 68 lakh records containing patient and doctor information.
Silence APT, a Russian-speaking cybercriminal group, known for targeting financial organizations primarily in former Soviet states and neighboring countries is now aggressively targeting banks in more than 30 countries across America, Europe, Africa, and Asia. Active since at least September 2016, Silence APT group's...
Cyber-Security is much more than a matter of IT
It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it