Category cyber-attacks

Chinese Hackers Exposed by U.S. Water Control System Decoy

August 5, 2013

A notorious hacking group from China, known as APT1 or Comment Crew, potentially affiliated with the Chinese military, has been caught infiltrating a simulated United States water control system, also referred to as a honeypot. Kyle Wilhoit, a researcher from Trend Micro, disclosed the findings at the BlackHat Conference this past Wednesday.

Back in December, the hackers targeted a water control system for a U.S. municipality, unaware it was a ruse set up by Wilhoit. The decoy utilized a Word document embedded with malicious software, allowing for complete access.

These honeypots closely resembled the ICS/SCADA devices employed in critical infrastructure for power and water facilities. The setup, which employed cloud software, produced realistic web-based login and configuration screens for local water plants, making them look as though they were based in various countries, including Ireland, Russia, Singapore, China, Japan, Australia, Brazil, and the U.S. Researchers have traced the activity back to the APT1 Group, which was previously linked to by the security firm Mandiant.

Chinese Hackers Compromised by Deceptive U.S. Water Control System Honeypots August 5, 2013 In a recent revelation, a prominent hacker group from China, identified as APT1 or the Comment Crew, has been implicated in an attempted breach of a simulated United States water control system that was, in fact, a…

Read More

Chinese Hackers Exposed by U.S. Water Control System Decoy

August 5, 2013

A notorious hacking group from China, known as APT1 or Comment Crew, potentially affiliated with the Chinese military, has been caught infiltrating a simulated United States water control system, also referred to as a honeypot. Kyle Wilhoit, a researcher from Trend Micro, disclosed the findings at the BlackHat Conference this past Wednesday.

Back in December, the hackers targeted a water control system for a U.S. municipality, unaware it was a ruse set up by Wilhoit. The decoy utilized a Word document embedded with malicious software, allowing for complete access.

These honeypots closely resembled the ICS/SCADA devices employed in critical infrastructure for power and water facilities. The setup, which employed cloud software, produced realistic web-based login and configuration screens for local water plants, making them look as though they were based in various countries, including Ireland, Russia, Singapore, China, Japan, Australia, Brazil, and the U.S. Researchers have traced the activity back to the APT1 Group, which was previously linked to by the security firm Mandiant.

Pakistani Hackers Target Thousands of Israeli Websites in Support of Palestine

August 14, 2013

A widespread cyber attack is currently underway, with thousands of Israeli websites being compromised by Pakistani hackers in solidarity with the Palestinian people. Reports indicate that around 650 Israeli websites have already been infiltrated, with the hackers posting their messages on these sites. One hacker, known by the alias “H4x0r HuSsY,” communicated with The Hacker News to announce upcoming releases of additional hacked websites. The attacker’s message included slogans such as “LONG LIVE PALESTINE – PAKISTAN ZINDABAD HAPPY INDEPENDENCE DAY TO & FROM TEAM MADLEETS.”

The affected sites include semi-government, personal, and corporate Israeli domains. At the time of this report, many of these websites continue to display defaced pages. This cyber offensive follows a recent declaration of a “cyber war” on Israel by global hacker collectives, including the Anonymous group, after the Israeli Defense Forces threatened to cut off internet access in Gaza.

Cyber Attack on Israeli Websites Orchestrated by Pakistani Hackers in Support of Palestine August 14, 2013 A significant cyber offensive has unfolded as Pakistani hackers target thousands of Israeli websites in a demonstration of solidarity with the Palestinian people. According to reports, the attackers have already compromised approximately 650 Israeli…

Read More

Pakistani Hackers Target Thousands of Israeli Websites in Support of Palestine

August 14, 2013

A widespread cyber attack is currently underway, with thousands of Israeli websites being compromised by Pakistani hackers in solidarity with the Palestinian people. Reports indicate that around 650 Israeli websites have already been infiltrated, with the hackers posting their messages on these sites. One hacker, known by the alias “H4x0r HuSsY,” communicated with The Hacker News to announce upcoming releases of additional hacked websites. The attacker’s message included slogans such as “LONG LIVE PALESTINE – PAKISTAN ZINDABAD HAPPY INDEPENDENCE DAY TO & FROM TEAM MADLEETS.”

The affected sites include semi-government, personal, and corporate Israeli domains. At the time of this report, many of these websites continue to display defaced pages. This cyber offensive follows a recent declaration of a “cyber war” on Israel by global hacker collectives, including the Anonymous group, after the Israeli Defense Forces threatened to cut off internet access in Gaza.

FBI Collaborated with Anonymous and LulzSec Hackers to Target Foreign Governments

August 28, 2013

Sentencing for former LulzSec leader Hector Xavier Monsegur, also known as “Sabu,” has been postponed again. Monsegur, who pleaded guilty to multiple criminal charges two years ago, faces a maximum sentence exceeding 124 years. Additionally, fellow LulzSec hacker Jeremy Hammond has alleged that the FBI utilized Sabu to orchestrate attacks against foreign governments, leveraging the efforts of Anonymous and other hackers.

The ongoing delays suggest that the FBI may not be fully extracting information from Monsegur, hinting at the possibility that he is assisting with other covert operations as claimed by Hammond. In a recent statement, Hammond accused the U.S. government of directing Monsegur to motivate fellow hacktivists to breach foreign government entities. “What many don’t realize is that Sabu was also used by his handlers to orchestrate hacking activities targeting government-selected entities, including multiple foreign government websites,” Hammond stated.

FBI Collaborated with Anonymous and LulzSec Hackers for Foreign Government Cyber Operations On August 28, 2013, developments emerged regarding Hector Xavier Monsegur, infamously known as “Sabu,” the former leader of the hacking group LulzSec. His sentencing, initially slated for last year after he pleaded guilty to multiple criminal charges, has…

Read More

FBI Collaborated with Anonymous and LulzSec Hackers to Target Foreign Governments

August 28, 2013

Sentencing for former LulzSec leader Hector Xavier Monsegur, also known as “Sabu,” has been postponed again. Monsegur, who pleaded guilty to multiple criminal charges two years ago, faces a maximum sentence exceeding 124 years. Additionally, fellow LulzSec hacker Jeremy Hammond has alleged that the FBI utilized Sabu to orchestrate attacks against foreign governments, leveraging the efforts of Anonymous and other hackers.

The ongoing delays suggest that the FBI may not be fully extracting information from Monsegur, hinting at the possibility that he is assisting with other covert operations as claimed by Hammond. In a recent statement, Hammond accused the U.S. government of directing Monsegur to motivate fellow hacktivists to breach foreign government entities. “What many don’t realize is that Sabu was also used by his handlers to orchestrate hacking activities targeting government-selected entities, including multiple foreign government websites,” Hammond stated.

Meta Warned That Facial Recognition Glasses Could Empower Sexual Predators

A coalition of over 70 civil liberties organizations, including notable groups such as the ACLU and the Electronic Privacy Information Center, has called on Meta to abandon plans to implement facial recognition technology in its smart glasses produced in partnership with Ray-Ban and Oakley. The functionality, internally referred to as…

Read MoreMeta Warned That Facial Recognition Glasses Could Empower Sexual Predators

Zero-Day Exploit in Internet Explorer Used for Targeted Watering Hole Attacks on Japanese Users

Sep 24, 2013

Attackers are leveraging a zero-day vulnerability, CVE-2013-3893, in Microsoft’s Internet Explorer browser to target Japanese users through compromised popular news websites. According to FireEye, at least three major Japanese media outlets fell victim to these watering hole attacks, part of an operation dubbed “DeputyDog,” which appears to focus on manufacturers, government entities, and media organizations within Japan. The compromised sites experienced over 75,000 page views before the exploits were detected. This vulnerability in Internet Explorer versions 8 and 9 enables the covert installation of malware on users’ devices, granting hackers remote access. Typically, these attackers deploy Trojans tailored for targeted operations aimed at stealing intellectual property. Researchers identified a payload disguised as an image file hosted on a Hong Kong server that was used against a Japanese target. The attacks were uncovered just two days after Microsoft disclosed the vulnerability.

Zero-Day Exploit Targets Japanese Users via Watering Hole Attacks In a significant cybersecurity incident reported on September 24, 2013, a zero-day vulnerability identified as CVE-2013-3893 in Microsoft’s Internet Explorer browser has been exploited through a series of watering hole attacks intended to compromise Japanese users. Attackers have reportedly targeted at…

Read More

Zero-Day Exploit in Internet Explorer Used for Targeted Watering Hole Attacks on Japanese Users

Sep 24, 2013

Attackers are leveraging a zero-day vulnerability, CVE-2013-3893, in Microsoft’s Internet Explorer browser to target Japanese users through compromised popular news websites. According to FireEye, at least three major Japanese media outlets fell victim to these watering hole attacks, part of an operation dubbed “DeputyDog,” which appears to focus on manufacturers, government entities, and media organizations within Japan. The compromised sites experienced over 75,000 page views before the exploits were detected. This vulnerability in Internet Explorer versions 8 and 9 enables the covert installation of malware on users’ devices, granting hackers remote access. Typically, these attackers deploy Trojans tailored for targeted operations aimed at stealing intellectual property. Researchers identified a payload disguised as an image file hosted on a Hong Kong server that was used against a Japanese target. The attacks were uncovered just two days after Microsoft disclosed the vulnerability.

The Most Ridiculous Hack of the Year Uncovers a Serious Issue

In the early hours of April last year, a significant cybersecurity incident unfolded across Silicon Valley, impacting about 20 street intersections. This unprecedented attack was executed by an unidentified individual who exploited weak, publicly accessible default passwords to wirelessly upload altered audio recordings. These recordings played in response to pedestrians…

Read MoreThe Most Ridiculous Hack of the Year Uncovers a Serious Issue

Thousands of WordPress Blogs Compromised for DDoS Attacks

September 25, 2013

A massive cyber attack campaign is currently targeting numerous WordPress websites across the internet. In April 2012, we reported on a widespread brute force attack against millions of WordPress sites, resulting in the compromise of approximately 90,000 servers to form a large botnet of WordPress hosts. Recent DDoS attack logs received from reader Steven Veldkamp at ‘The Hacker News’ reveal that victims’ websites are experiencing heavy DDoS attacks, stemming from various compromised WordPress sites.

Utilizing brute force techniques on WordPress administrative portals, hackers are exploiting poorly secured hosts using commonly known username and password combinations. An analysis of DDoS attack logs from September 23, 2013, indicates a storm of malicious activity over just 26 seconds…

Widespread Compromise of WordPress Blogs Results in DDoS Attacks September 25, 2013 A significant cyberattack campaign is currently targeting a large swath of WordPress websites across the globe. This follows a larger trend first reported in April 2012, when millions of WordPress sites were subjected to a widespread distributed brute-force…

Read More

Thousands of WordPress Blogs Compromised for DDoS Attacks

September 25, 2013

A massive cyber attack campaign is currently targeting numerous WordPress websites across the internet. In April 2012, we reported on a widespread brute force attack against millions of WordPress sites, resulting in the compromise of approximately 90,000 servers to form a large botnet of WordPress hosts. Recent DDoS attack logs received from reader Steven Veldkamp at ‘The Hacker News’ reveal that victims’ websites are experiencing heavy DDoS attacks, stemming from various compromised WordPress sites.

Utilizing brute force techniques on WordPress administrative portals, hackers are exploiting poorly secured hosts using commonly known username and password combinations. An analysis of DDoS attack logs from September 23, 2013, indicates a storm of malicious activity over just 26 seconds…

16-Year-Old Arrested for Involvement in History’s Largest Cyber Attack

Sept 27, 2013

A 16-year-old has been detained for allegedly participating in the largest DDoS attack ever recorded, targeting the Dutch anti-spam organization Spamhaus. The arrest, made by British police in April, came to light recently. Authorities stormed his home in south-west London after discovering substantial funds in his bank account. Upon investigation, he was found with various computer systems logged into virtual forums. The March 20 attack on Spamhaus was described as a monumental event in cybercrime, unleashing a torrent of traffic measured at 300 billion bits per second (300Gbps). DDoS attacks occur when hackers mobilize a network of infected computers to overwhelm a server, leading to shutdowns.

16-Year-Old Arrested in Connection with Historic Cyber Attack on Spamhaus Sept 27, 2013 Authorities have arrested a 16-year-old in the United Kingdom for his alleged involvement in what has been described as the largest Distributed Denial of Service (DDoS) attack in Internet history. The assault targeted Spamhaus, a prominent Dutch…

Read More

16-Year-Old Arrested for Involvement in History’s Largest Cyber Attack

Sept 27, 2013

A 16-year-old has been detained for allegedly participating in the largest DDoS attack ever recorded, targeting the Dutch anti-spam organization Spamhaus. The arrest, made by British police in April, came to light recently. Authorities stormed his home in south-west London after discovering substantial funds in his bank account. Upon investigation, he was found with various computer systems logged into virtual forums. The March 20 attack on Spamhaus was described as a monumental event in cybercrime, unleashing a torrent of traffic measured at 300 billion bits per second (300Gbps). DDoS attacks occur when hackers mobilize a network of infected computers to overwhelm a server, leading to shutdowns.

The Significance of Logs and Log Management in IT Security

In today’s digital landscape, IT security is paramount for organizations of all sizes. Effective security measures begin with vigilant monitoring of your network to identify vulnerabilities that could expose sensitive information to threats. This often includes employing firewalls as the first line of defense, alongside vulnerability management, intrusion detection and prevention systems, and careful configuration of network settings.

The importance of these measures cannot be overstated:

  • Routers may be easily compromised without proper configuration and restrictions.
  • An improperly configured firewall can leave open ports, enabling hackers to infiltrate the network.
  • Threats like rogue access points, botnet malware, and social engineering can transform your wireless network into a gateway for unauthorized access.

Why Are Logs Essential?

The primary goal of IT security is to…

The Crucial Role of Log Management in IT Security In today’s digital landscape, safeguarding IT infrastructure is non-negotiable for organizations of all sizes. Proactive measures to protect networks from vulnerabilities are imperative, as these weak points may serve as entryways for cyber attackers seeking access to sensitive data. Effective cybersecurity…

Read More

The Significance of Logs and Log Management in IT Security

In today’s digital landscape, IT security is paramount for organizations of all sizes. Effective security measures begin with vigilant monitoring of your network to identify vulnerabilities that could expose sensitive information to threats. This often includes employing firewalls as the first line of defense, alongside vulnerability management, intrusion detection and prevention systems, and careful configuration of network settings.

The importance of these measures cannot be overstated:

  • Routers may be easily compromised without proper configuration and restrictions.
  • An improperly configured firewall can leave open ports, enabling hackers to infiltrate the network.
  • Threats like rogue access points, botnet malware, and social engineering can transform your wireless network into a gateway for unauthorized access.

Why Are Logs Essential?

The primary goal of IT security is to…