Home » Tag Archives: hackers

Tag Archives: hackers

hacking wall street.jpg

Research: Hacking Wall Street – Restructuring the law for hackers’ trading schemes

As today one can buy Wall Street stock over the internet, a new form of securities fraudsters have recently been targeted by the US Securities and Exchange Commission (SEC). This new breed of fraudsters execute their conspiring schemes through the internet, beyond the conventional boundaries of corporate boardrooms. They are cybercriminals who attack and compromise computer networks of business corporations, ... Read More »

Two Hackers Sent to Prison for Their Roles in Hacking Talk Talk Company

Two suspected hackers have been sent to jail for conspiring and taking a role in compromising Talk Talk Telecommunication Company back in 2015. The two cybercriminals were identified as Mathew Hanley, 23, and Connor Allsopp, 21, who are both from Staffordshire. According to the court records, the two young hackers stole personal identifiable information (PII), banking details, and credit card ... Read More »

hackers.jpg

Research: Using Darknet Forums by Black Hat Hackers During Crisis Periods (Darknet Marketplace Shutdown)

Darknet marketplaces are growing at a rather rapid rate. These marketplaces are not only markets for illegal and illicit drugs, but they are also places where hackers are selling various hacking tools and offering hacking as a service (HaaS) for anyone who can pay the predetermined price in cryptocurrency. The black hat hacker market evolved from being merely a playground ... Read More »

architecture of micro-honeypot.PNG

Micro-Honeypots and the Usage of Browser Fingerprinting Techniques to Track Hackers

Malicious attacks have grown at a relatively high rate during the past few years across the whole internet. To shield websites against various forms of web attacks, researchers and penetration testers utilize honeypots to collect attack information. Nevertheless, hackers can hide themselves via stepping stones (e.g. proxy servers, VPNs) or anonymous P2P networks (e.g. the Tor network). Traditional honeypots are ... Read More »

Hackers and scammers of Russian darknet

Russian darknet was pretty shaken in 2017: top marketplace RAMP was closed, Russian Silkroad merged with Hydra market, and one of the oldest drugs forums Rutor was sold to new owners. Competition between main marketplaces led to using DDoS attacks and provocations. The same tendency persists in 2018 – servers are periodically offline, several markets have exit scammed or are ... Read More »

Minnesota Man Charged With Hiring Hackers to Bring Down Ex-Employer

Federal prosecutors in an ongoing Minnesota case involving cybercrime stated that a local business, and Monticello-based technology firm was a victim of cyber-attack which was instigated by a former worker. The former worker who was also a state resident employed hackers-for-hire to sabotage the website of Monticello. According to the FBI, this case is in relation to the growing form ... Read More »

How Hackers Avoid Honeypots

  Honeypots are networks, servers or web applications purposely built to appear vulnerable, thus showing obsolete operating systems and software, open services and ports, in order to attract malign visitors and induce them to try exploiting the system. While in a preceding tutorial I explained how to build your own honeypot, here I will explain how hackers try to avoid ... Read More »

cellebrite_devices_article.jpg

Hackers Steal Cellular Accounts to Break 2FA Protected Online Bitcoin Wallets

All of the major cellular service providers have been seeing an increase of attacks on customer accounts. Hackers are stealing cell phone numbers from users of Verizon, AT&T, T-Mobile, and Sprint through social engineering techniques. Once the attackers have control of a phone number they can use it to reset passwords for services like Google and social media sites. The ... Read More »

The Ghost Telephonist Allows Hackers to Make Calls and Texts from Your Phone Number

Chinese researchers unveiled a new mobile phone hacking technique they have created during a talk at this year’s Black Hat hacker conference in Las Vegas, Nevada. The researchers are from Qihoo 360’s Unicorn Team. The Unicorn Team specializes in hacking radio and cellular technology. On Thursday, July 27th, the Unicorn Team delivered a presentation at Black Hat on their new ... Read More »

HOW HACKERS HIDE MALICIOUS SITES

  Since 2006, security researchers have been watching a new technique used in cybercrime to hide malicious traffic behind an intricate network of proxies. This technique called fast-flux, was initially used by few people but lead to thousands of personal computers infected and criminal content like phishing sites and malwares successfully delivered to innocent users. Fast-flux networks are today the ... Read More »

Hackers Demand Over $250,000 for Ransomware Decryption Keys

Hackers Demand Over $250,000 for Ransomware Decryption Keys The alleged authors of the NotPetya ransomware, which swept through Ukraine locking the systems of governments, financial institutes and businesses, demanded a payment of 100 BTC, which was over $250,000 at the time, for the private keys. Earlier this week, Motherboard reported that cyber security researchers detected movement around the BTC wallet ... Read More »