Russian Hacker Project DDoSIA Grew by Multiple Times

DDoSIA project appears to be first massive volunteer-based DDoS-for-hire project

Analysts of the Sekoia company reported that the Russian DDoSia hacker project grew by 2400% in less than a year. That project pays volunteers to participate in attacks on Western organizations. More than 10,000 people are currently involved in the attacks. DDoS-for-hire services became particularly popular over the last years. We recently did the review… Continue reading Russian Hacker Project DDoSIA Grew by Multiple Times

RepoJacking Attacks Could Threaten Millions of GitHub Repositories

Aqua researchers believe that millions of repositories on GitHub are vulnerable to an attack that allows taking over other people’s repositories and is called RepoJacking. The issue is reportedly affecting the repositories of Google, Lyft, and other major companies. Let me remind you that we also wrote that Malware in GitHub Repositories Is Spread From… Continue reading RepoJacking Attacks Could Threaten Millions of GitHub Repositories

APT28 Attacked Ukrainian and Polish Organizations

Recorded Future, in collaboration with CERT-UA researchers, has unveiled a recent cyber offensive orchestrated by Russian-speaking hackers affiliated with the APT28 Group (also known as Fancy Bear, BlueDelta, Sednit, and Sofacy). Their target: Roundcube mail servers of various Ukrainian organizations, including government entities. As a reminder, we previously reported on the divergence of hacker groups,… Continue reading APT28 Attacked Ukrainian and Polish Organizations

Freaky Leaky SMS: Message Delivery Report Can Be Used to Determine the Location of the Recipient

Researchers have created a side-channel attack called “Freaky Leaky SMS”, which allows finding out the location of the recipient of messages, based on the delivery time of reports on the receipt of SMS messages. Let me remind you that we also wrote about true Apocalypse Now: experts presented a new type of cyber-biological attack, and… Continue reading Freaky Leaky SMS: Message Delivery Report Can Be Used to Determine the Location of the Recipient

Malware Propagation On Darknet Forums

Darknet forums have become a marketplace for malware developers

The forums on the dark web are well-known for being a hub of cybercriminal activity, including an auction system. Here, bad actors can trade tips on hacking, share samples of malware, and demonstrate how to exploit vulnerabilities. For those who develop malware, Darknet communication platforms, specifically forums, became a perfect marketing platform. The developers of… Continue reading Malware Propagation On Darknet Forums

ChatGPT and Google Bard Generate Keys for Windows 10/11

Users have discovered a way to force ChatGPT and Google Bard to generate working keys for Windows 11 Pro and Windows 10 Pro. It turned out that for this user had to ask artificial intelligence to behave like his deceased grandmother. That, actually, is not the only example of curious behaviour of ChatGPT. Earlier, we… Continue reading ChatGPT and Google Bard Generate Keys for Windows 10/11

BreachForums Is Back Online, Led by ShinyHunters

It is quite an uncommon occasion when black hat hackers takeover the ceased Darknet forum

BreachForums, an infamous Darknet forum that was shut down in late March 2023, is back online since approx. June 13 2023. After 3 months offline, it is revived by a hacker group called ShinyHunters. But will Breached be as successful as they used to be? What is BreachForums? Breached Forums used to be a massive… Continue reading BreachForums Is Back Online, Led by ShinyHunters

RDP Honeypot Was Attacked 3.5 Million Times

A honeypot designed for RDP was targeted with 3.5 million attacks.

With increased remote work, IT teams use remote access tools to manage company devices and ensure smooth operations. Remote desktop connections are highly attractive to hackers, with an average of over 37,000 attempts from multiple IP addresses daily. These attacks are typically automated, but once the hackers gain access credentials, they manually search for critical… Continue reading RDP Honeypot Was Attacked 3.5 Million Times

Hackers Can Use ChatGPT Hallucinations to Distribute Malicious Packages

According to vulnerability and risk management company Vulcan Cyber, attackers can manipulate ChatGPT to distribute malicious packages to software developers. Let me remind you that we also said that ChatGPT has become a New tool for Cybercriminals in Social Engineering, and also that ChatGPT Causes New Wave of Fleeceware. IS specialists also noticed that Amateur… Continue reading Hackers Can Use ChatGPT Hallucinations to Distribute Malicious Packages

How to Defeat Insider Threat?

Insider threat is a commonly underestimated danger which can deal a lot of damage to your company

In the current digital world, organizations face more risks than ever due to fast-paced technological changes. However, while external cyber threats such as hackers and malware often dominate the headlines, there is a lurking danger that often goes unnoticed and is underestimated – the insider threat. Insider Threat Definition An insider threat refers to harmful… Continue reading How to Defeat Insider Threat?