October 13, 2020 | computer | No Comments
April 14, 2021
March 3, 2021
October 14, 2020
October 13, 2020 | computer | No Comments
October 7, 2020 | technology | No Comments
By Raphael Satter and Christopher Bing
WASHINGTON (Reuters) – Saudi diplomats, Sikh separatists and Indian business executives have been among those targeted by a group of hired hackers, according to research published on Wednesday by mobile firm BlackBerry Corp.
The report on the group, known publicly as Bahamut, the name assigned to the mythical sea monster of Arab lore, highlights how cybersecurity researchers are increasingly finding evidence of mercenaries online.
BlackBerry’s vice president of research, Eric Milam, said the diversity of Bahamut’s activities was such that he assumed it was working for a range of different clients.
“There’s too many different things going on across too many different ranges and too many different verticals that it would be a single state,” Milam said ahead of the report’s release.
In June, Reuters reported on how an obscure Indian IT firm called BellTroX https://www.reuters.com/article/idUSKBN23G1GQ offered its hacking services to help clients spy
September 29, 2020 | technology | No Comments
A cybercriminal has published private data belonging to thousands of students following a failed attempt to exhort a ransomware payment from a Nevada school district.
Ransomware is a form of malware that can have a devastating impact on businesses and individuals alike.
Once a ransomware package has landed and executed on a vulnerable system, files are usually encrypted, access to core systems and networks is revoked, and a landing page is thrown up demanding a payment — usually in cryptocurrencies such as Bitcoin (BTC) or Monero (XMR) in return for a decryption key — which may or may not work.
See also: Ransomware is your biggest problem on the web. This huge change could be the answer
Ransomware operators target organizations across every sector in the hopes that the fear of disrupting core operations will pressure victims into paying up. It may not be a valid legal expense, but for
September 28, 2020 | technology | No Comments
Last month, Las Vegas’ largest public school district announced that a hacker compromised some of its files using ransomware and was holding the files hostage while demanding a ransom payment.
Now, a hacker has published files containing students’ grades and personal information after school district officials refused to pay the ransom.
Brett Callow, a threat analyst with cybersecurity
September 28, 2020 | computer | No Comments
A hacker who was part of the notorious Dark Overlord group has been handed a five-year prison term for his crimes.
British national Nathan Wyatt was jailed by a Missouri court this week after pleading guilty to conspiring to commit aggravated identity theft and computer fraud in 2016. The group targeted a number of medical-related firms and accounting businesses, remotely stealing data that included personal information belonging to patients and clients. The Dark Overlord then threatened to sell the data on the dark web unless the firms made Bitcoins payment of as much as $300,000. None of the companies are believed to have followed the gang’s instructions.
The court documents revealed little about the targeted businesses, though it’s known that they are located in Missouri, Illinois, and Georgia, media outlets reported on Monday.
Wyatt, who was also ordered to pay about $1.5 million in restitution, told the court via Zoom,
May 4, 2020 | computer | No Comments
The most common visual is the pale nerd in his mother’s basement who is getting into his university server to change his rivals grades to failing ones. Then there are the various Hollywood depictions which show “master criminals” manipulating traffic signals and financial markets. This is a fairly recent use of the word “hacker” and for years before it had a very different meaning.
In the early 90’s when Linux (a popular free computer operating system) was introduced, the word hacker did not even exist. Users of these operating systems referred to themselves as “hackers”, only due to their ability to manipulate and reuse programming code for their own purposes, outside of its originally intended purpose. If you think of them as chefs, everyone has that one basic recipe for lobster bisque, but each chef will put their own spin on the recipe to make it their own. They were … Read More