Hackers!

General science/tech/society news, everything not directly related to computer hardware/software.

Moderator: Moderators

Post Reply
User avatar
impar
Moderator
Moderator
Posts: 21521
Joined: Fri Mar 21, 2003 11:42 am

Re: Hackers!

Post by impar »

Greetings!
Ireland refuses to pay ransom demand in attack on its national health service
The HSE took its IT systems offline as a precaution

https://www.theverge.com/2021/5/14/2243 ... h-security
Pipeline attacker DarkSide suddenly goes dark—here’s what we know
The closure may mean the group is ceasing or altering ops—or pulling an exit scam.

https://arstechnica.com/gadgets/2021/05 ... t-we-know/
Ransomware attacks are only getting worse, DarkSide group "quits," but that may just be a strategy
The group behind Colonial Pipeline attack claims it lost access to its infrastructure and funds

Ransomware attacks in recent years have proven that no company is safe from them, which has encouraged hacker groups like DarkSide to grow their ambitions and go after larger targets. Unfortunately for them, this also prompted a fierce response from government agencies -- something they likely didn't expect or plan for. Still, there are voices in the security community that say this is merely an "exit scam," where ransomware operators retreat for a while to plan for their future attacks.

https://www.techspot.com/news/89689-ran ... quits.html
W10x64 - B450 - R5 3600 - 16GB - RX 5700 - 1TB - 4TB - 24" 16:10 - 650W

This war is nothing but graphs of production intersecting...
General Groves, in Uber Invasion #11
User avatar
Tabajara
Ultra nForced
Ultra nForced
Posts: 7632
Joined: Sun Mar 30, 2003 7:33 pm

Re: Hackers!

Post by Tabajara »

impar wrote: Mon May 17, 2021 9:39 am Greetings!
Pipeline attacker DarkSide suddenly goes dark—here’s what we know
The closure may mean the group is ceasing or altering ops—or pulling an exit scam.

https://arstechnica.com/gadgets/2021/05 ... t-we-know/
They attacked US critical infrastructure... :mrgreen:
Come put your overclock into good use at the nforcersHQ [email protected] team! :sweet:
User avatar
impar
Moderator
Moderator
Posts: 21521
Joined: Fri Mar 21, 2003 11:42 am

Re: Hackers!

Post by impar »

Greetings!
Colonial Pipeline CEO confirms company paid $4.4 million ransom it wasn’t supposed to pay
It also shut down its own pipeline in the first place

https://www.theverge.com/2021/5/19/2244 ... s-shortage
W10x64 - B450 - R5 3600 - 16GB - RX 5700 - 1TB - 4TB - 24" 16:10 - 650W

This war is nothing but graphs of production intersecting...
General Groves, in Uber Invasion #11
User avatar
impar
Moderator
Moderator
Posts: 21521
Joined: Fri Mar 21, 2003 11:42 am

Re: Hackers!

Post by impar »

Greetings!
The Full Story of the Stunning RSA Hack Can Finally Be Told
In 2011, Chinese spies stole the crown jewels of cybersecurity—stripping protections from firms and government agencies worldwide. Here’s how it happened.
...
In the decade that followed, many key RSA executives involved in the company’s breach have held their silence, bound by 10-year nondisclosure agreements. Now those agreements have expired, allowing them to tell me their stories in new detail. Their accounts capture the experience of being targeted by sophisticated state hackers who patiently and persistently take on their most high-value networked targets on a global scale, where an adversary sometimes understands the interdependencies of its victims’ systems better than victims do themselves, and is willing to exploit those hidden relationships.
...
https://www.wired.com/story/the-full-st ... y-be-told/
W10x64 - B450 - R5 3600 - 16GB - RX 5700 - 1TB - 4TB - 24" 16:10 - 650W

This war is nothing but graphs of production intersecting...
General Groves, in Uber Invasion #11
User avatar
impar
Moderator
Moderator
Posts: 21521
Joined: Fri Mar 21, 2003 11:42 am

Re: Hackers!

Post by impar »

Greetings!
SolarWinds hackers are back with a new mass campaign, Microsoft says
Kremlin-backed group uses hacked account to impersonate US aid agency.

https://arstechnica.com/gadgets/2021/05 ... -campaign/
W10x64 - B450 - R5 3600 - 16GB - RX 5700 - 1TB - 4TB - 24" 16:10 - 650W

This war is nothing but graphs of production intersecting...
General Groves, in Uber Invasion #11
User avatar
impar
Moderator
Moderator
Posts: 21521
Joined: Fri Mar 21, 2003 11:42 am

Re: Hackers!

Post by impar »

Greetings!
World’s largest meat supplier grinds to a halt after cyberattack
The White House believes the attack originated from a criminal organization in Russia

https://www.theverge.com/2021/6/1/22463 ... t-supplier
W10x64 - B450 - R5 3600 - 16GB - RX 5700 - 1TB - 4TB - 24" 16:10 - 650W

This war is nothing but graphs of production intersecting...
General Groves, in Uber Invasion #11
User avatar
impar
Moderator
Moderator
Posts: 21521
Joined: Fri Mar 21, 2003 11:42 am

Re: Hackers!

Post by impar »

Greetings!
FBI names REvil as the group behind meat supplier cyberattack
JBS supplies a fifth of the world’s meat

https://www.theverge.com/2021/6/3/22466 ... inal-group
W10x64 - B450 - R5 3600 - 16GB - RX 5700 - 1TB - 4TB - 24" 16:10 - 650W

This war is nothing but graphs of production intersecting...
General Groves, in Uber Invasion #11
User avatar
impar
Moderator
Moderator
Posts: 21521
Joined: Fri Mar 21, 2003 11:42 am

Re: Hackers!

Post by impar »

Greetings!
Hacker lexicon: What is a supply chain attack?
From NotPetya to SolarWinds, it’s a problem that’s not going away any time soon.
...
That insidious and increasingly common form of hacking is known as a "supply chain attack," a technique in which an adversary slips malicious code or even a malicious component into a trusted piece of software or hardware. By compromising a single supplier, spies or saboteurs can hijack its distribution systems to turn any application they sell, any software update they push out, even the physical equipment they ship to customers, into Trojan horses. With one well-placed intrusion, they can create a springboard to the networks of a supplier's customers—sometimes numbering hundreds or even thousands of victims.
...
That theoretical trick—a kind of double supply chain attack that corrupts not only a widely used piece of software but the tools used to create it—has since become a reality, too. In 2015, hackers distributed a fake version of XCode, a tool used to build iOS applications, that secretly planted malicious code in dozens of Chinese iPhone apps. And the technique appeared again in 2019, when China's Barium hackers corrupted a version of the Microsoft Visual Studio compiler so that it let them hide malware in several video games.
...
https://arstechnica.com/information-tec ... in-attack/
W10x64 - B450 - R5 3600 - 16GB - RX 5700 - 1TB - 4TB - 24" 16:10 - 650W

This war is nothing but graphs of production intersecting...
General Groves, in Uber Invasion #11
User avatar
thegrommit
Ultra nForced
Ultra nForced
Posts: 6668
Joined: Sat Aug 02, 2003 1:24 am

Re: Hackers!

Post by thegrommit »

Interesting that they managed to get the private key:
Water cooled clay
User avatar
powerarmour
Mod Squad
Mod Squad
Posts: 13852
Joined: Sun Oct 13, 2002 2:10 am

Re: Hackers!

Post by powerarmour »

EA hacked and source code stolen

https://www.bbc.co.uk/news/technology-57431987
Libera te tutemet ex inferis
Post Reply