THE CULPRIT BEHIND THE FIREEYE 2015 HACK ARRESTED

The hacker, yet to be publicly identified, who carried out the 2015 doxing attack against Mandiant, a FireEye owned firm based in Virginia, was arrested last 02 November 2017 by international law enforcers. FireEye is an international private cyber-security company known for their impenetrability and reliability.  FireEye conductions cyber-security operations for enormous companies and stands Read more…

 

BAD RABBIT DISCOVERED TO BE USING ETERNALROMANCE EXPLOIT FROM NSA

Recently, the Bad Rabbit ransomware was detected to be rapidly-spreading across Europe.  Now, it was discovered that the Bad Rabbit infection is using an exploit called EternalRomance which is believed to be one of the leaked NSA tools. The said ransomware functions like Petya ransomware.  Bad Rabbit is a ‘Win32/Diskcoder.D’ malware, a new but similar Read more…

 

The CoinHive Monero Mining Service was hacked using DNS Settings

The CoinHive website for Monero mining was hijacked so that the websites embedded by its code have purposely redirected their generated cryptocurrency to the attackers’ servers, instead of CoinHive’s official servers. The blooming popularity of cryptocurrencies was so rapid that even attackers have diverted their attention into these digital currencies rather than physical ones.  Attackers Read more…

 

DUHK ATTACK CAN RECOVER COMMON CRYPTOGRAPHIC KEYS

Another vulnerability set in the key-finding set of tools is now recently discovered – the DUHK attack or Don’t Use Hard-coded Keys.  DUHK can easily infiltrate devices using ANSI X9.31 Random Number Generator (RNG). Recently, several cryptographic key vulnerabilities were reported such as KRACK Wi-Fi attack and ROCA factorization attack. The mechanics of KRACK sums up Read more…

 

BAD RABBIT RANSOMWARE – A NEW RANSOMWARE ATTACK

A new globally-threatening ransomware emerged this year.   Dubbed as Bad Rabbit Ransomware, said ransomware is now rapidly spreading across Europe.  It has infected almost 200 major organizations in Russia, Ukraine, Turkey and Germany. Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or Read more…

 

U.S. WARNED ENERGY FIRMS OF POSSIBLE CYBER-ATTACKS

The US government, specifically the FBI and Homeland Security have warned energy firms regarding in the increasing number of cyber-threats this 2017. In September 2017, The Dragonfly hacking group have emerged and executed a wave of cyber-attacks against energy facilities in Europe and North America such as nuclear, energy, aviation, water and critical manufacturing industries. Read more…

 

KASPERSKY LAB TIMELINE – COLLABORATION WITH RUSSIAN INTELLIGENCE

There has been a series of speculations and theories that the Kaspersky’s antivirus program functions differently, and provides a secret backdoor to Russian intelligence. Does the allegation have a decent basis? Or a mere coincidence? The Kaspersky Lab is previously a well-regarded information security firm founded in 1997 by a Russian national named Eugene V. Read more…

 

LOCKY RANSOMWARE RETURNS USING MICROSOFT WORD DDE FUNCTIONALITY

Locky Ransomware attempts again to invade the cyber-world, this October 2017, using the Dynamic-Data-Exchange (DDE) functionality of Microsoft Word. Beforehand, a ransomware known as Locky had made chaos across the world in 2016, and devastated a great number of computers worldwide. On August 2017, said ransomware made its way back into cyberspace using the Diablo6 Read more…

 

CUTLET MAKER, AN ATM MALWARE FOR SALE ON THE DARKNET

A malware dubbed as Cutlet Maker is now for sale over the Dark Net which could be used to crack ATMs in as fast as 60 seconds. ATMs nowadays become targets of cyber-criminals because of their increasing availability and vulnerability due to their conspicuous locations and lack of physical security.  A new method is now Read more…

 

ROCA VULNERABILITY ENDANGERS MILLIONS OF RSA KEYS WORLDWIDE

There is a newly discovered vulnerability, dubbed as ROCA (Return of Coppersmith’s Attack), in RSA encryption keys used in smart cards, security tokens and PC chipsets.  The said vulnerability can be found in chips made by German company Infineon Technologies AG. RSA (Rivest–Shamir–Adleman) is one of the first practical public-key cryptosystems and is widely used Read more…