China, who is currently battling against the deadly coronavirus epidemic said last Friday that it needs international support from countries across as it is in the midst of an ‘exceptional’ and ‘full-on war’ against the deadly virus. The statement arrived…
Category: E Hacking News – Latest Hacker News and IT Security News
Clause Addition to the IT Act; Social Media Companies Now Responsible For All Nonuser Generated Content
A change brought in line with the changes in the US and Europe, the Indian government has recently added a clause to the proposed IT intermediary guidelines, making social media companies responsible for all nonuser produced content including supported content,…
Banking Trojan ‘Metamorfo’ Now Targeting Online Users’ Banking Services
Online banking users are being targeted by a trojan malware campaign going around the globe with the agenda of gaining illegal access to personal information such as credit card details and other sensitive data of users. The banking trojan which…
Group of 10 hackers was convicted for stealing gasoline and selling
The court issued a verdict on February 3 in the case of theft of fuel at Rosneft gas stations.The court and investigation found that there were ten people in the hacker group, two women and eight men. They divided criminal…
120 Million Medical Records Leaked! Global Medical Report Sheds More Light.
Along with cyber-security within your phones and other devices, you must make sure the hospital you go to has enough cyber-protection as well! The obnoxiousness of cyber-criminals is escalating by the hour. As if stealing data of organizations and loosely…
Teenager Arrested for DDoS Attack in Ukraine
Ukranian Police arrested a 16 yrs old teenager last month on charges of attacking a local Internet Service Provider (ISP) to gain personal information about the users. The police (Ukranian) says that the teen used the technique of DDoS (distributed…
Apple Engineers unveils a proposal to standardize the two factor authentication process and Google backs it up!
Apple known for it’s off the charts security features was recently troubled with hacks, malware and phishing attacks staining its reputation and customer trust. And to counter that, Apple has again risen to strengthen its security and user experience –…
The Prosecutor General’s Office of the Russian Federation proposes to create a single resource to combat cyber fraud
Specialized service for collecting data on cybercrime in the financial sector, which will help counteract fraud in cyberspace, may appear in Russia. The Prosecutor General’s Office of Russia made a proposal to register Russian scammers. It is noted that currently…
Google Cuts Down Chrome’s Patch-Gap in Half, from 33 to 15 Days now
Last week, Google has announced the cutting down of ‘patch gap’ in half for Chrome and the future plans of cutting it down further are also making the headlines. Security Engineers at Google told that the ‘patch gap’ for Google…
Chinese Origin Threat Group Targets Hong Kong Universities with New Backdoor Variant
The Winnti, a China-linked threat group that has been active in the cyberspace since 2009 was found to be employing a new variant of the ShadowPad backdoor (group’s new flagship tool) in the recent attacks where it compromised computer systems…
Hackers used the websites of Russian government agencies to extract cryptocurrency
According to the deputy head of the National Coordination Center for Computer Incidents of the FSB, Nikolai Murashov, encryption viruses decreased their activity last year and were replaced by malware. In particular, these programs have changed for crypto-jacking or hidden…
Mobile Banking Malware On The Rise, 50% Hike In Attacks! WhatsApp a Dependable Medium?
According to studies, with an increase of 50% malware attacks have known no bounds in the past year. Most common of all happen to be malware that steals users’ financial data and bank funds. The banking malware is on the…
Ransomware Hits Media Monitoring Company ‘TV Eyes’
The latest ransomware has attacked ‘TV Eyes,’ a company that offers campaign monitoring services to TV and radio news broadcasts. PR agencies and newsrooms across the world mostly use TV Eyes service to keep a trace of their broadcast. “The…
Can you find a bug in Xbox Live? Microsoft will pay you, if you do!
Think you’re an expert at Xbox? Think you can find a bug in Xbox Live? Well, Microsoft might pay you some bucks. Microsoft has launched an official bug bounty hunt for the Xbox Live network in order to improve the…
Ukrainian authorities proposed online media to track readers and transfer data to the cyber police
A real scandal began with the rights of journalists, the media and freedom of speech in Ukraine. The Ukrainian cyber police sent a circular to various Internet publications in Ukraine with a proposal to install special software codes on the…
A Drug Molecule “Invented” By Artificial Intelligence (AI) To Be
Created by British start-up Exscientia and Japanese pharmaceutical firm Sumitomo Dainippon Pharma a drug molecule “artificial” by artificial intelligence (AI) will be utilized in human trails in a world-first for machine learning in the field of medicine. Especially to be…
Apple Engineers to Standardize the Format of the SMS Messages Containing OTPs
A proposal comes from Apple engineers working at WebKit, the core component of the Safari web browser, to institutionalize the format of the SMS messages containing one-time passwords (OTP) that users receive during the two-factor authentication (2FA) login process. With…
A Drug Molecule “Invented” By Artificial Intelligence (AI) To Be Used In Human Trials
Created by British start-up Exscientia and Japanese pharmaceutical firm Sumitomo Dainippon Pharma a drug molecule “artificial” by artificial intelligence (AI) will be utilized in human trails in a world-first for machine learning in the field of medicine. Especially to be…
Facebook to give $550 Million as a Settlement in a Lawsuit
Social Media giant Facebook is to pay an amount of $550 million as a settlement in what appears to be another series of lawsuits, and this time, it is a Facial Recognition issue. The lawsuit is not good for the…
Hacked! SCPI Protocol Vulnerabilty; Measurement Instruments Could be Hacked!
A leading cyber-security firm recently alerted all the netizens about a vulnerability discovered in the measurement tools that support the Standard Commands for Programmable Instruments (SCPI) protocol, mentioned reports. According to sources, SCPI is an ASCII-based standard especially crafted out…
Pavel Durov again warned about the danger of using WhatsApp
Pavel Durov claims that the hacking of the iPhone of Jeff Bezos, the richest man in the world, occurred due to vulnerabilities in WhatsApp. Facebook which owns the messenger insists that the leak is related to the Apple device itself.…
Roskomnadzor blocked the email service Protonmail
The FSB of the Russian Federation reported that it was possible to install another email service that was used by an “electronic terrorist” to send messages about mining of objects with a massive stay of people in Russia. On Wednesday,…
Sophisticated Hackers Infiltrate Dozens of U.N. Servers
An internal confidential document from the United Nations, leaked to The New Humanitarian and seen by The Associated Press, says many servers were undermined including at the U.N. human rights office, which gathers rather sensitive information all year round. According…
Alert! Your Mac maybe under threat – SHLAYER MALWARE attacks every 10th Mac OS
The macOS traditionally was always considered a safe bet compared to Windows but now even Apple is facing a dangerous security threat. Kaspersky reports that Macs have become a hot target for a dangerous malware – SHLAYER, been active for…
Alert! Your Mac under threat – SHLAYER MALWARE attacks every 10th Mac OS
The macOS traditionally was always considered a safe bet compared to Windows but now even Apple is facing a dangerous security threat. Kaspersky reports that Macs have become a hot target for a dangerous malware – SHLAYER, been active for…
Avast Antivirus Harvested Users’ Data and Sold it Google, Microsoft, IBM and Others
Avast, a popular maker of free anti-virus software being employed by almost 435 million mobiles, Windows and Mac harvested its users’ sensitive data via browser plugins and sold it to third parties such as Microsoft, Google, Pepsi, IBM, Home Depot,…
The website of the Echo of Moscow radio station reported a two-week hacker attack
For two weeks, the website of the Echo of Moscow radio station and the computers of its employees have been hacked. According to Sergey Buntman, First Deputy Editor-in-Chief of Echo, the radio station technically and actually proved that there are…
Vulnerability found in Cisco Webex Meeting Suit- Lets unauthorized attackers join private meetings
Cisco Webex Meetings Suite, a platform that offers its customers to organize online meetings and seminars anytime anywhere, has revealed a security vulnerability that allows an unauthorized attacker to enter a password-protected meeting without the password. The Vulnerability –The vulnerability…
Understand how SIM Swapping can easily be used to hack your accounts!
We’ve all heard about sim swapping, SIM splitting, simjacking or sim hijacking- the recent trend with cybercriminals and now a study by Princeton University prooves the vulnerability of wireless carriers and how these SIM swapping has helped hackers ease their…
Researchers And Army Join Hands to Protect the Military’s AI Systems
As an initiative to provide protection to the military’s artificial intelligence systems from cyber-attacks, researchers from Delhi University and the Army have joined hands, as per a recent Army news release. As the Army increasingly utilizes AI frameworks to identify…
Malware Attack! Oregon County’s Network Smashed By a Ransomware?
Per local news and reports, allegedly, a cyber-attack shook the Tillamook County of Oregon, USA when it rendered the local government’s services ineffective. Apparently owing it to the cyber-attack, the county officials are back to basics with all their daily…
Alexander Baranov says Russia has nothing to do with the cyberattack on the friendly Austrian Foreign Ministry
The hacker attack that the Austrian Ministry of Foreign Affairs underwent prompted European countries to take active measures to defend against such attacks. At the same time, the EU accuses Moscow of the attack, which makes no sense, given the…
U.N Officials not using WhatsApp over Security Reasons
“The United Nations officials are not using WhatsApp for purposes of communication as it is unsafe and vulnerable to hacking,” said a UN spokesperson last Thursday. The statement came out following the Jeff Bezos incident, where experts at the UN…
Internet Explorer Targeted by North Korean Hackers: How to Stay Safe?
In a recent cybersecurity issue, some hackers from North Korea are attacking Internet Explorer by exploiting a vulnerability, which is said to be a zero-day flaw. The company Microsoft has not yet spoken on the issue and is still silent. …
Modified TrickBot Trojan can now Steal Windows Active Directory Credentials
TrickBot trojan, a strain of malware that has been around affecting users since 2016 – is now evolved to steal Windows Active Directory credentials. Today, in the cybersecurity ecosystem it is considered as one of the top threats abusing businesses,…
UK to develop a system to track cryptocurrencies
HM Revenue and Customs (HMRC) of the UK Government has submitted a tender for the development of a system for monitoring financial transfers in digital money. The appearance of such a system in Russia could already have occurred. Cryptocurrencies can…
Simple Tips to Prevent your WhatsApp Account from Hackers
WhatsApp (now owned by Facebook), a popular social networking app, as we all know, is very easy to setup. But this simple process also opens your account to some vulnerabilities and threats, if you are not cautious while setting your…
Experts predicted an increase in the number of DDoS attacks in 2020
In Russia, the number of DDoS attacks will increase due to the introduction of 5G technology, said Anton Fishman, head of the system solutions Department of the Group-IB. He noted that the wider introduction of 5G will significantly increase the…
Amazon Chief’s Phone Hacked by the Saudi Arab Crown Prince
Referring to anonymous sources, a British daily newspaper came up with reports on details regarding Amazon Chief Jeff Bezos’ cell phone being hacked in the wake of accepting a message from the Saudi Arabian crown. Theft of information from Bezo’s…
Russian Bank reminds about the danger of transferring personal data to someone
Transferring personal data to someone (details of cards and accounts, passport data), you can become a victim of cyber fraud, so you can not do this in any case, recalled the Deputy Chairman of the Board of Sberbank Stanislav Kuznetsov.…
Canadian Teenager Charged and Arrested for $50 Million Cryptocurrency Theft
Samy Bensaci, an 18-year-old teenager from Montreal, Canada has been indicted for 4 criminal charges in relation to a theft of cryptocurrency worth $50 million in a SIM-swapping scam that targeted cryptocurrency holders, as per the reportings by Infosecurity Magazine,…
Cyber Attack Alert! A Fake Factory Network Attacked With RAT, Ransomware, Malware and So On!
Researchers simulated a real-looking “Industrial prototyping” organization with fake employees, PLCs, and websites to study the types of cyber-attacks that commonly on such networks. The elaborately fake organization’s website and the network worked on a highly advanced interactive “honeypot” network…
More than half of Russian companies are concerned about the protection of personal data of employees and customers
The antivirus company ESET studied the state of information security in the Russian business sector, interviewing dozens of IT Directors and business owners. According to ESET research, different types of cyber threats affected 90% of Russian businesses. 60% of Russian…
Google Maps…Creepy or Useful?
Whether Android or iPhone there is no denying that Google is there for all of us, keeping a track log of our data in a “Timeline” that unequivocally shows wherever we’ve been, which while in some cases is amazingly valuable…
Railway Protection Force (RPF) bust a multi-crore ticket fraud
Bengaluru: The Railway Protection Force busted a multi crore ticket booking fraud and apprehended two miscreants who hacked the railway booking website and used the ANMS Tatkal software to book tickets. The ticketing racket seems to have been working all…
Bot List Containing Telnet Credentials for More than 500,000 Servers, Routers and IoT Devices Leaked Online
This week, a hacker published a list on a popular hacking forum containing Telnet credentials for over 515,000 servers, home routers and IoT (Internet of Things) “smart” devices. The massive list which reportedly was concluded by browsing the whole internet…
Website Puts 12 Billion User Records Up For Sale and Gets Seized By US Authorities
Are you fond of buying stolen’/leaked data? Because, one such domain, named ‘WeLeakInfo.com’ recently got seized by the US authorities. WeLeakInfo, with its absolutely convenient name, had been selling stolen data from other hacked websites, online for the past three…
Ukrainian government job site posted passport scans of thousands of civil service candidates
Government job site https://career.gov.ua/ published scans of passports and other documents of citizens who registered on the portal to search for work in the government sector. This was announced on January 16 by the Office of the Ombudsman of Ukraine…
The authorities of Uzbekistan to launch a national mining pool
Uzbekistan plans to legalize mining by providing the status of a participant in the mining pool, which is planned to be created in the Republic. This is stated in the draft resolution of the President “On measures for further development…
European Union likely to ban Facial Recognition for 5 years
The EU (Europian Union) is considering restricting the use of facial recognition technology for a possible duration of 5 years, in public area sectors. The reason being is the regulators need some time to consider the protection of unethical exploitation…
Adult Webcam Models’ Private and Sexual Data Compromised!
Undoubtedly, being an “Adult Webcam Model” means living a “revealing” life “out in the open”. But to an extent where “Personal” and “Sexual” details are laid out on the table? Not what most would think. PussyCash, an infamous “live webcam…
52 Hackers get into the US Army system in the last 5 weeks
Last year, during October and November, 52 hackers were able to hack the US army. “It only strengthens our security systems as the hackers who hacked our systems did it on ethical principles, as the participants of second ‘Hack the…
Over 600 Million Users Download 25 ‘Fleeceware’ Apps from the Play Store
Researchers at security firm Sophos has discovered a new set of Android apps present on the Google Play Store that contain fleeceware. Notably, these apps have been downloaded and installed by over 600 million unsuspecting Android users. The term ‘Fleeceware’…
Russian banks to face risk due to a cancellation of support for Windows 7
Termination of technical support for Windows 7 and Windows Server 2008 operating systems (OS) can become a serious problem for Russian banks. According to the architect of the Microsoft technology center in Russia, Ivan Budylin, now, banks are required to…
Hackers from Russia hacked the Ukrainian gas company Burisma
Russian hackers in November 2019 attacked the Ukrainian energy company Burisma in order to gain potentially compromising information about former US Vice President Joe Biden and his son Hunter. Starting in November 2019, a series of phishing attacks were carried…
Cyber Security Incidents- the biggest risk to Businesses!
According to a survey of 2,718 executives from across 100 countries, cyber security incidents ranked as the biggest risk to businesses globally. The survey was participated by CEOs, risk managers, brokers and insurance experts and 39% of them said cyber…
An Ex-Operating System Hit by an Exploit Found In Audio Files
A crypto-mining exploit attack, has as of late been discovered in Windows 7 , the ex-operating system which ceased to exist only a couple of days back as per the official announcement by Microsoft, hidden away in sound WAV records.…
Another Chinese state-sponsored hacking groups discovered – would be the fourth one to be found
A group of cyber security analyst, Intrusion Truth have found their fourth Chinese state-sponsored hacking operation APT 40. “APT groups in China have a common blueprint: contract hackers and specialists, front companies, and an intelligence officer,” the Intrusion Truth team…
Kaspersky Lab recorded an increase in attacks by Russian hackers on banks in Africa
Kaspersky Lab recorded a wave of targeted attacks on major banks in several Tropical African countries in 2020. It is assumed that the attacks are made by the Russian-speaking hacker group Silence. According to the company’s leading anti-virus expert, Sergey…
Facebook Code Update Gone Wrong Exposes Anonymous Admins
Recently Facebook encountered quite a bug crisis, as a bad code update going live on the night of 10th January apparently prompted the exposure of the mysterious anonymous of admins and many known personalities for a few hours. All it…
Hackers sell data of 80 thousand cards of customers of the Bank of Kazakhstan
An announcement about the sale of an archive of stolen data from 80,000 Halyk Bank credit cards appeared on the Darknet’s site Migalki.pw. It should be noted that Halyk Bank of Kazakhstan is the first Bank in the country in…
Phishing Attack Alert! Los Angeles County Says No Harm Done!
A Phishing attack last month surfaced over the LA County which was immediately contained before any devices got compromised. The attack was discovered by the staff, last month. The containment of the attack was done by the staff instantaneously before…
Hackers Blackmail Patients of Surgical Company in a Cyber attack
The patients of a facial surgical company in Florida, who were hacked recently, are now being threatened by hackers. The hackers demand that the patients pay them money, or else they would leak their personal information online. TCFRR (The Center…
TrickBot Added New Stealthy Backdoor for High-Value Targets
The authors behind the infamous TrickBot malware – a modular banking trojan that targets sensitive financial information and also acts as a dropper for other malware–have developed a stealthy custom backdoor, circulating by the name ‘PowerTrick’, to monitor high-value targets…
Sodinokibi Ransomware threats Travelex to release data, if ransom not paid.
The Sodinokibi Ransomware attackers are pressuring Travelex, a foreign exchange company to pay a 6 million dollar ransom amount or risk going their data public, the attackers warn that they will either release or sell the stolen data that contains…
Kaspersky Lab reports North Korean Hacker group Lazarus stealing cryptocurrencies using the Telegram messenger
A group of hackers calling themselves Lazarus modified their previous scheme to steal cryptocurrency which was used in 2018. Hackers use more effective tactics and act more carefully. According to Kaspersky Lab, now, not only users of the macOS operating…
Malware Against Crypto-Currency Businesses; Microsoft and Apple are Targets Alike
“AppleJeus” operation was the first time “macOS” users were made victims by Lazarus. Herein, a manipulated application was used to target potential victims. Apparently, Lazarus used customized malware, especially for macOS users. Per leading sources, the malware had been so…
SNAKE Ransomware Targets Entire Corporate Systems?
The new Snake Ransomware family sets out to target the organizations’’ corporate networks in all their entirety, written in Golang and containing a significant level of obfuscation, the observations and disclosure for the attacks were made by a group of…
PayPal Fixes ‘High-Severity’ Password Security Vulnerability
Researcher Alex Birsan, while examining PayPal’s main authentication flow– discovered a critical security flaw that hackers could have exploited to access passwords and email addresses of users. He responsibly reported the vulnerability to PayPal on November 18, 2019, via the…
Russian experts warn the danger of charging the phone in public places
The number of charging stations at airports, bus stops, metro stations and other public places in Russia has been growing rapidly in recent years. However, using such USB-inputs is not safe because attackers can access data stored in the phone…
Cisco faces criticism after a hacker finds 120+ bugs in its product
A triad of severe vulnerabilities in Cisco DCNM (Data Center Network Manager) stock allows hackers to remotely sidestep the verification and invade into companies’ servers, the reason being a few safety failures that include hard-coded creds. The 3 vulnerabilities were…
Samsung announces a new product Ballie – a robot companion
Samsung has launched a new product at CES 2020, named Ballie a tennis ball-like robot that rolls around following the owner. The bot Ballie has a built-in camera to follow it’s the owner and capture special moments, Samsung South Korean…
Cyber Attack Alert! Microsoft Gives Inside Revelations About RDP Brute Force Attacks
Microsoft conducted a long-term study, which majorly focused on RDP brute-force attacks, their success and the duration they last for. Per sources, according to the reports of the study, over 0.8% of the RDP brute force attacks on an average…
Ukrainian cyber police exposed a fraudulent scheme of financial auctions
Earlier EhackingNews reported that cyber police in the Kharkiv region exposed members of a criminal hacker group who purposefully carried out attacks on private organizations and individuals to illegally gain access to their remote servers. It is established that in…
Clop Ransomware Upgraded, Now can Terminate 663 Windows Processes
In February 2019, Michael Gillespie from MalwareHunter Team founded Clop ransomware that has been evolving to reach its full potential and now a variant of the same can terminate a total of 663 Windows processes. While it was first discovered,…
Department Of Homeland Security Monitoring the Apparent Hack of a Government Website
The Federal Depository Library Program website, run by the Government Publishing Office recently fell victim to a hacking operation being referred to as “defacement” by a senior administration official. The website makes federal government records and data accessible to the…
DeathRansom, started as a mere joke is now encrypting files!
A ransomware strain named DeathRansom, which was considered a joke earlier, evolved and is now capable of encrypting files, cyber-security firm Fortinet reports. This DeathRansom after becoming an actual malware, was backed by a solid distribution campaign and has been…
Privacy Alert! Xiaomi’s Security Cameras Not All That Secure?
If you think that if you have a security camera at your home then you are safe, you are absolutely wrong to sleep on your chair so freely! Xiaomi instantly hit headlines when one of its security cameras displayed stills…
The Russian Embassy in Sweden responded to the Swedish Minister’s statement about “Russian trolls”
The Russian Embassy in Sweden reacted to an interview with Swedish Minister of Energy and Information Technology Anders Igeman to the TT Agency, in which he said that “Russian trolls” who are opponents of 5G technology attacked his Facebook. Russia…
Military Personnel and Veterans – faced the worst hit by scammers loosing 405 Million dollars since 2012
It’s easy to trick anyone in a financial scam but hackers and scammers found their favorite victims in militants and veterans. According to a new report analyzed by the Federal Trade Commission (FTC) and Better Business Bureau, nearly one million…
The Internet isolation law will save the Russian Federation from isolation from the World Wide Web
In 2019, Russia took a number of measures to ensure the security of the information sphere, which in recent years has become the main means of foreign intelligence services to spread lies. First Deputy Chairman of the Federation Council Committee…
Google Chrome Extension, Shitcoin Wallet found stealing passwords and crypto-wallet keys
MyCrypto platform, reported that Shitcoin Wallet, a Google Chrome extension was injecting JavaScript code on web pages , in order to steal passwords and keys from cryptocurrency wallets. The extension, Shitcoin Wallet, Chrome extension ID: ckkgmccefffnbbalkmbbgebbojjogffn, was launched last month…
Warning! Ireland’s National Cyber Security Strategy; Fight Against Cyber-Crime
Ireland is all set to fight cyber-crime with its recently updated “National Cyber Security Strategy” which is way ahead of the last one the nation had. This security strategy is just a way to meticulously ensure that the Irish netizens…
Email Server of Special Olympics of New York Hacked; Later Used To Launch a Phishing Campaign
A nonprofit organization committed towards competitive athletes with intellectual inabilities, The Special Olympics of New York as of late at the Christmas holidays had their email server hacked which was later utilized to dispatch a phishing campaign against past donors.…
Indian Security Researcher Finds Starbucks API Key Exposed on GitHub
Developers at Starbucks left an API (Application Programming Interface) key exposed to hackers with no password protection that could have been used by them to gain access to internal systems and consequently manipulate the list of authorized users. Hackers could…
Seattle- based Wyze alleged of data breach: Unpaired all devices from Google Assistant and Alexa
Seattle-based smart home appliance maker Wyze, which is popular for selling its products cheaper than its competitors, has been accused of a data breach and trafficking the data to Alibaba Cloud servers in China. In response to the alleged data…