#HackerGroup

Rene Robichaudnerowild
2025-01-09
Norobiik @Norobiik@noc.socialNorobiik@noc.social
2024-06-25

Every IT manager's nightmare 😱
---
#Indonesia’s #NationalDataCenter has been compromised by a #HackerGroup asking for a $8 million ransom that the government says it won’t pay.

The #cyberattack has disrupted services of more than 200 #GovernmentAgencies at both the national and regional levels since last Thursday

Indonesia won’t pay an $8 million dollar ransom after a cyberattack compromised its national data center
apnews.com/article/indonesia-r

2024-01-06

To mitigate the risks associated with such attacks, organizations are advised to enforce strong password policies, implement two-factor authentication (2FA), limit login attempts, monitor SSH traffic, and maintain up-to-date systems and software.

#Cybersecurity #Cyberattack #Cyberespionage #Netherlands #HackerGroup #SeaTurtle

cybersec84.wordpress.com/2024/

2024-01-06

The attackers utilized a combination of tools during the campaign, including an executable wiper (NACL.exe) requiring administrator privileges to erase data by removing the boot signature from the Master Boot Record (MBR).

#Cybersecurity #Cyberattack #Albania #NoJustice #Malware #HackerGroup

cybersec84.wordpress.com/2024/

2023-12-30

Kimsuky executes espionage campaigns through spear-phishing attacks, using malicious lure documents that, when opened, lead to the deployment of various malware families.

#Cybersecurity #HackerGroup #NorthKorea #Malware #Kimsuky

cybersec84.wordpress.com/2023/

2023-12-24

While Cloud Atlas focuses on espionage and stealing confidential information, the identity of the group’s sponsoring country remains unclear.

#Cybersecurity #Cyberattacks #HackerGroup #Ukraine #CloudAtlas #Russia

cybersec84.wordpress.com/2023/

2023-12-24

A report by the U.S. Department of Homeland Security’s Cyber Safety Review Board (CSRB) highlighted LAPSUS$’s use of SIM-swapping attacks to compromise victim accounts and infiltrate target networks.

#Cybersecurity #HackerGroup #LAPSUS #UK

cybersec84.wordpress.com/2023/

2023-12-23

The IT Army of Ukraine informed that it executed a distributed denial-of-service (DDoS) attack on Bitrix24’s systems, targeting the infrastructure supporting the company’s operations, including data centers and internal services.

#Cybersecurity #Cyberattack #Ukraine #Russia #HackerGroup #Bitrix24

cybersec84.wordpress.com/2023/

2023-12-17

One notable method involves exploiting vulnerabilities in outdated software applications, such as XML External Entity (XXE) flaws.

#Cybersecurity #Cyberthreat #HackerGroup #Malware

cybersec84.wordpress.com/2023/

2023-12-16

The threat involves leaking 533.1GB of data allegedly stolen from the center’s networks, with only thumbnails of select documents published so far.

#Cybersecurity #FredHutch #HackerGroup #CyberAttack #USA #HuntersInternational #Ransomware

cybersec84.wordpress.com/2023/

2023-12-16

Storm-0539 also gathers emails, contact lists, and network configurations, preparing for subsequent attacks against the same organizations.

#Cybersecurity #HackerGroup #Microsoft #Phishing #Scams #Storm0539

cybersec84.wordpress.com/2023/

2023-12-15

Exploitation of TeamCity typically results in code execution with high privileges, providing the SVR a strategic foothold in the network environment.

#Cybersecurity #APT29 #Cyberattacks #Russia #HackerGroup #TeamCity #Exploits

cybersec84.wordpress.com/2023/

2023-12-14

SiegedSec hacktivists, who previously claimed responsibility for breaches involving NATO and Atlassian, leaked the stolen human resources data on a hacking forum.

#Cybersecurity #USA #INL #DataBreach #Idaho #SiegedSec #HackerGroup

cybersec84.wordpress.com/2023/

2023-12-14

According to Microsoft, various threat actors, including Octo Tempest (also known as Scattered Spider), leveraged accounts provided by Storm-1152 to execute ransomware attacks, data theft, and extortion schemes.

#Cybersecurity #Microsoft #HackerGroup #Cybercrime #Storm1152

cybersec84.wordpress.com/2023/

2023-12-14

GambleForce distinguishes itself through its exclusive reliance on open-source tools like dirsearch, sqlmap, tinyproxy, and redis-rogue-getshell throughout different stages of its attacks.

#Cybersecurity #APAC #Cyberattacks #HackerGroup #SQLInjection #GambleForce

cybersec84.wordpress.com/2023/

2023-12-14

Moreover, the attackers have disclosed passport scans of Insomniac Games employees, including a former staff member who departed for Disney following termination two months ago.

#Cybersecurity #Cyberattack #Rhysida #HackerGroup #InsomniacGames

cybersec84.wordpress.com/2023/

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst