Law enforcement officers closed the hacker resource RaidForums

During the international operation TOURNIQUET, which was coordinated by Europol, the well-known hacker resource RaidForums, which was mainly used to trade in stolen databases, was closed. The administrator of RaidForums and two of his accomplices have been arrested, and the site’s infrastructure is now under the control of law enforcement agencies. The operation was reportedly… Continue reading Law enforcement officers closed the hacker resource RaidForums

Leaked Conti ransomware source codes were used to attack Russian authorities

In March 2022, the source codes of the Conti malware were made public, and now, apparently, other hackers are starting to use them, turning the ransomware against Russian authorities and companies. Let me remind you that this story began back in February 2022, when an anonymous information security researcher who had access to the infrastructure… Continue reading Leaked Conti ransomware source codes were used to attack Russian authorities

British police announced the arrest of several members of the Lapsus$ group

Recently, the hack group Lapsus$ mentioned that several of its members were going on vacation, and soon law enforcements in the UK announced the arrest of seven alleged members of Lapsus$. The hack group Lapsus$ has only recently entered the scene, but has already compromised Microsoft, Nvidia, Ubisoft and other major companies. One of the… Continue reading British police announced the arrest of several members of the Lapsus$ group

Lapsus$ hack group stole the source codes of Microsoft products

The Lapsus$ hack group has released the source codes for Bing, Cortana, and other Microsoft products allegedly stolen from an internal Microsoft Azure DevOps server. Over the weekend, a screenshot appeared on the Lapsus$ Telegram channel demonstrating that hackers attacked the Microsoft Azure DevOps server and got to the sources of Bing, Cortana and various… Continue reading Lapsus$ hack group stole the source codes of Microsoft products

The popular node-ipc npm package removes files on systems of developers from Russia and Belarus

The developer of the popular npm package node-ipc has released updated versions of his library and in this update expressed its protest against the ongoing Russian aggression in Ukraine. New versions of the package delete all data and overwrite files on the machines of developers from Russia and Belarus, and also create text files with… Continue reading The popular node-ipc npm package removes files on systems of developers from Russia and Belarus

DuckDuckGo downgraded Russian state media in search results

The founder and head of DuckDuckGo, Gabriel Weinberg, said that the search engine would lower Russian media and sites that spread “Russian propaganda” in search results. Some were dissatisfied with this decision of the DuckDuckGo management, which has always focused on privacy and ethics. On Twitter, Weinberg writes that sites “linked to Russian disinformation” will… Continue reading DuckDuckGo downgraded Russian state media in search results

Decryption keys for Maze, Egregor and Sekhmet ransomware were posted on the Bleeping Computer forum

The Bleeping Computer forum published master keys for decrypting data affected by Maze, Egregor and Sekhmet ransomware attacks. Apparently, the keys were “leaked” by one of the developers of the malware. Journalists remind that the Maze ransomware has been active since May 2019 and quickly gained wide popularity, as its operators first came up with… Continue reading Decryption keys for Maze, Egregor and Sekhmet ransomware were posted on the Bleeping Computer forum

Experts are already fixing attacks on the Log4Shell vulnerability

Security researchers are already scanning the network looking for products affected by a dangerous bug in the Log4j library and are fixing the results of cybercriminals’ attacks on a Log4Shell vulnerability. The vulnerability is already being exploited to deploy miners, Cobalt Strike beacons, etc. An issue in the popular Log4j logging library included in the… Continue reading Experts are already fixing attacks on the Log4Shell vulnerability

Emotet now installs Cobalt Strike beacons

The researchers warn that Emotet now directly installs Cobalt Strike beacons on infected systems, providing immediate access to the network for attackers. Those can use it for lateral movement, which will greatly facilitate extortion attacks. Let me remind you that usually Emotet installs TrickBot or Qbot malware on the victim’s machines, and that one already… Continue reading Emotet now installs Cobalt Strike beacons

Ukrainian law enforcement officers arrested members of the hacker group Phoenix

The Security Service of Ukraine (SBU) announced the arrest of five members of the international hacker group Phoenix, which specializes in remote hacking of mobile devices and collection of personal data. Law enforcement officers report that the group included five citizens of Ukraine (residents of Kyiv and Kharkiv), and all of them had a higher… Continue reading Ukrainian law enforcement officers arrested members of the hacker group Phoenix