fbpx

Download free GDPR compliance checklist!

Tag Archives for " hacking "

Chinese Hackers Selling Intimate Stolen Camera Footage

Stolen videos captured by tens of thousands of security cameras at private properties throughout China are now for sale across social media, marketed as sex tapes.

In just one 20-day period in February, the Post reported that one seller shared 8,000 videos in one group chat. The members of this chat group were VIPs, the Post added, who would then turn around and sell those videos to others.

Source: Chinese Hackers Selling Intimate Stolen Camera Footage | Threatpost

After A Major Hack, U.S. Looks To Fix A Cyber ‘Blind Spot’

The National Security Agency considers itself the world’s most formidable cyber power, with an army of computer warriors who constantly scan the wired world. Yet by law, the NSA only collects intelligence abroad, and not inside the U.S.

U.S. rivals like Russia are aware of this blind spot and know how to exploit it, as the NSA director, Army Gen. Paul Nakasone, explained recently to the Senate Armed Services Committee.

In a major breach last year, hackers widely believed to be from Russia’s foreign intelligence service, the SVR, placed malware on a software update produced by the Texas company Solar Winds.

No one had reason to be suspicious, or the legal authority to monitor, as that software update was sent out electronically from SolarWinds to 18,000 organizations, including nine U.S. government agencies.

Source: After A Major Hack, U.S. Looks To Fix A Cyber ‘Blind Spot’ : NPR

Credit Card Hacking Forum Gets Hacked, Exposing 300,000 Hackers’ Accounts

Carding Mafia, a forum for stealing and trading credit cards has been hacked, exposing almost 300,000 user accounts, according to data breach notification service Have I Been Pwned.

The data breach allegedly exposed the email addresses, IP addresses, usernames, and hashed passwords of 297,744 users. Have I Been Pwned announced the data breach on Tuesday, saying the breach happened last week.

Source: Credit Card Hacking Forum Gets Hacked, Exposing 300,000 Hackers’ Accounts

Surveillance Camera Hack Raises Legal Risk of Digital Device Use

A recent hack into a massive collection of security camera data from Verkada Inc. shows the cyber and privacy-related vulnerabilities of digital devices that could give way to lawsuits and government enforcement actions.

The Verkada hack could bring attention from the Federal Trade Commission and state attorneys general who enforce laws protecting against unfair and deceptive business practices. The company also could be found liable under state-level data breach laws that require security controls to be in place.

Wiretapping laws could come into play, too, if there are audio recordings implicated in the hack. So could health privacy laws, for hacked video footage from hospitals or clinics.

Full article: Surveillance Camera Hack Raises Legal Risk of Digital Device Use

Swiss authorities raid home of hacker potentially responsible for breaching surveillance cameras

Swiss law enforcement raided the home of a hacker potentially responsible for breaching around 150,000 surveillance cameras, exposing sensitive footage from homes, hospitals and prisons.

The police in Lucerne, Switzerland, carried out a home search Friday at the request of the U.S. government on a residence connected to the hacker Tillie Kottmann who claimed credit for the breach, declining to name those involved.

Tillie Kottmann claimed responsibility for the breach, which was carried out by the international hacking group that Kottmann is a part of, as a way to bring attention to how easily surveillance systems can be compromised.

Source: Swiss authorities raid home of hacker potentially responsible for breaching surveillance cameras | TheHill

US Moves Closer to Retaliation Over Hacking as Cyber Woes Grow

The Biden administration is reportedly close to a decision on retaliation for state-sponsored hacking as fears grew over the fallout from the latest of two major cyberattacks.

The official said the White House was working closely with the private sector to ramp up cyber defenses following the attacks which targeted Microsoft Exchange servers and SolarWinds security software, potentially compromising thousands of government and private computer networks.

US officials had previously hinted at moves against Russia, which has been linked to the massive SolarWinds hack that shook the government and corporate security last year. The latest comments suggested forthcoming actions.

Source: US Moves Closer to Retaliation Over Hacking as Cyber Woes Grow | SecurityWeek.Com

A Hacker Got All My Texts for $16

A gaping flaw in SMS lets hackers take over phone numbers in minutes by simply paying a company to reroute text messages.

Once the hacker is able to reroute a target’s text messages, it can then be trivial to hack into other accounts associated with that phone number. In this case, the hacker sent login requests to Bumble, WhatsApp, and Postmates, and easily accessed the accounts.

The method of attack, which has not been previously reported or demonstrated in detail, has implications for cybercrime, where criminals often take over target’s phone numbers in order to harass them, drain their bank account, or otherwise tear through their digital lives. The attack also brings up issues around private, corporate, and national security, where once a hacker gains a foothold on a victim’s phone number, they may be able to intercept sensitive information or personal secrets.

Source: A Hacker Got All My Texts for $16

Hackers Breach Thousands of Security Cameras, Exposing Tesla, Jails, Hospitals

A group of hackers say they breached a massive trove of security-camera data collected by Silicon Valley startup Verkada Inc., gaining access to live feeds of 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools.

Companies whose footage was exposed include carmaker Tesla Inc. and software provider Cloudflare Inc. In addition, hackers were able to view video from inside women’s health clinics, psychiatric hospitals and the offices of Verkada itself. Some of the cameras, including in hospitals, use facial-recognition technology to identify and categorize people captured on the footage. The hackers say they also have access to the full video archive of all Verkada customers.

Source: Tesla (TSLA), Cloudfare (NET) Breached in Verkada Security Camera Hack – Bloomberg

Microsoft email server flaws exploited to hack at least 30,000 US organizations

The Chinese state-sponsored group dubbed Hafnium ramped up and automated its campaign after the patch was released. In the US, the group infiltrated at least 30,000 organizations using Exchange to process email, including police departments, hospitals, local governments, banks, credit unions, non—profits and telecommunications providers.

Worldwide, the number of victims is reportedly in the hundreds of thousands. A former national security official Wired talked to said thousands of servers are getting compromised per hour around the world.

When Microsoft announced its emergency patch, it credited security firm Volexity for notifying it about Hafnium’s activities. Volexity president Steven Adair now said that even organizations that patched their servers on the day Microsoft’s security update was released may have still been compromised.

Source: Microsoft email server flaws exploited to hack at least 30,000 US organizations | Engadget

COMB – Biggest Data Breach of All Time Explained

It’s being called the biggest breach of all time and the mother of all breaches: COMB, or the Compilation of Many Breaches, contains more than 3.2 billion unique pairs of cleartext emails and passwords. While many data breaches and leaks have plagued the internet in the past, this one is exceptional in the sheer size of it. To wit, the entire population of the planet is at roughly 7.8 billion, and this is about 40% of that.

However, when considering that only about 4.7 billion people are online, COMB would include the data of nearly 70% of global internet users (if each record was a unique person). For that reason, users are recommended to immediately check if their data was included in the leak.

Full article: COMB – Biggest Data Breach of All Time Explained | CyberNews

1 2 3 28
>