Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Cyber Army. Show all posts

No environment is immune to cyber attacks : Research

Global cyber-security solutions provider Check Point Software Technologies Ltd, released its “Cyber Attack Trends: 2019 Mid-Year Report”, revealing that no environment is immune to cyber-attacks.

Threat actors continue to develop new tool sets and techniques, targeting corporate assets stored on cloud infrastructure, individuals’ mobile devices, trusted third-party supplier applications and even popular mail platforms:

Mobile banking: With over 50% increase in attacks when compared to 2018, banking malware has evolved to become a very common mobile threat. Today, banking malware is capable of stealing payment data, credentials and funds from victims’ bank accounts, and new versions of these malware are ready for massive distribution by anyone that’s willing to pay.

Software supply chain attacks: Threat actors are extending their attack vectors such as focusing on the supply chain. In software supply chain attacks, the threat actor typically instils a malicious code into legitimate software, by modifying and infecting one of the building blocks the software relies upon.

Email: Email scammers have started to employ various evasion techniques designed to bypass security solutions and anti-spam filters such as encoded emails, images of the message embedded in the email body, as well as complex underlying code which mixes plain text letters with HTML characters. Additional methods allowing scammers to remain under the radar of Anti-Spam filters and reaching targets’ inbox include social engineering techniques, as well as varying and personalizing email content.

Cloud: The growing popularity of public cloud environments has led to an increase in cyber-attacks targeting enormous resources and sensitive data residing within these platforms. The lack of security practices such as misconfiguration and poor management of the cloud resources, remains the most prominent threat to the cloud ecosystem in 2019, subjecting cloud assets to a wide array of attacks.

“Be it cloud, mobile or email, no environment is immune to cyber attacks. In addition, threats such as targeted Ransomware attacks, DNS attacks and Cryptominers will continue to be relevant in 2019, and security experts need to stay attuned to the latest threats and attack methods to provide their organizations with the best level of protection,” said Maya Horowitz, Director, Threat Intelligence & Research, Products at Check Point.

North Korean hackers, now have power to kill

Prof Kim Heung-Kwang, a defector from North Korea who escaped from the country in 2004, has revealed that North Korean hackers have enough control over infrastructure that they could theoretically even kill people.

The Professor revealed this piece of information to BBC and said that North Korea approximately had around 6,000 trained military grade hackers. He has urged international organizations to step in and defuse the threat North Korea's hackers are becoming.

Before defecting from North Korea, Prof Kim taught at the Hamheung Computer Technology University for 20 years in the field of computer science.

Bureau 121, North Korea's hacking unit, has been widely accused of being responsible for recent hacks like the Sony Pictures one that occurred last year.

Many of the attacks of North Korea seem to be focused on their immediate neighbor, South Korea.

Hackers shut Down the entire Internet and Phone service in Palestine


Hackers Attacked the  Palestinians main servers and shut down the Internet and Phone service,says  Mashour Abou Daqqa (Palestinian Telecoms minister) on Tuesday.  He alleged foreign govt behind this attack.

The attack affected Internet service across the West Bank and Gaza.The minister said hackers are using international IP servers that indicates location as Germany, China, and Slovenia . 

"Since this morning all Palestinian IP addresses have come under attack from places across the world," Mashur Abu Daqqa told AFP on Tuesday afternoon.
 
"The sites have been attacked in an organised using mirror servers.

"I think from the manner of the attack and its intensity that there is a state behind it, and it is not spontaneous."

"Israel could be involved as it announced yesterday that it was considering the kind of sanctions it would impose on us," he added.

The incident came a day after the United Nations Educational, Scientific and Cultural Organization voted to admit Palestine as a full member of the group, a move that angered Israel.

Hackers have also shut down the Internet in the Palestinian territories before. In 2002, Wired reported that the Israeli army took over the offices of the leading Palestinian Internet service provider, Palnet, and shut down its operations. Services went back up after 24 hours.After then-Egyptian President Hosni Mubarak shut down the Internet and cellphones to quell unrest early this year, he was required, along with two of his aides, to pay $90 million in fines for damaging the country’s economy.

hi5ads.com Hacked and Database Exposed by 3xp1r3 cyber army

hi5ads.com is hacked by a Hackers team named as "3xp1r3 cyber army".  They exposed the database in pastebin. About 8000 users data is leaked.  The leak contains the password and email of users.

If you are one of the user  and used same password for gmail, immediately change your password now .

Majority of password is 123456, those users may not know about the cyber security.  If you also using simple password like 123456,iloveyou,ilovemom, then you should Check our Security Blog to know about the Interenet Risks and Cyber Security.  



Pakistan Cyber Army hacked BSNL System-10,000 users at risk


Bharat Sanchar Nigam Ltd (BSNL), an Indian state-owned telecommunications company, is reportedly breached by the Pakistan hacker group referring itself as "Pakistan Cyber Army" .


The group provided the three screenshots that proves they have gained access to the database.

They are reportedly accessed 10,000 User personal information including name, email, phone number and location.

The hackers also compromised some other information including BSNL’s internal working of VPN ,detail of circuits and as well as more technical details.

The screenshots provided by the group:




Indian Hacker hacked Pakcyberarmy Database


Lucky, leader of the Indian hacker group "Indishell" hacked into the Pakcyberarmy.net and cracked 1500+ user's passwords from their database.

Pakcyberarmy.net is the hub of most of the Pakistani hackers.  He leaked the info via an excel file.
"Most of the Users/Hackers used the same passwords to their emails and what ever u wanna do do it spam, play , abuse or what ever you feel like its all yours" According to Lucky.

The password List is available :
http://www.multiupload.com/ERWJ33UPI2
Archive password - proud_to_be_indian
Format - HASH : PASSWORD