Tag: #hacker

  • Monitoring Nigeria’s Cyberspace Before, During, and After the 2023 Gubernatorial and State Assembly Elections

    Monitoring Nigeria’s Cyberspace Before, During, and After the 2023 Gubernatorial and State Assembly Elections

    The Honourable Minister of Communications and Digital Economy, Professor Isa Ali Ibrahim (Pantami), FCIIS, FBCS, FNCS, wishes to bring to the attention of the digital economy stakeholders and the general public the Ministry’s activities before, during, and after the 2023 Gubernatorial and State Assembly elections.

    It may be recalled that on the 14th March, 2023, the Office of the Honourable Minister of Communications and Digital Economy released a Press Statement regarding the activities of the Ministry and its parastatals before, during and after the Presidential and National Assembly elections. As a follow up to that and in line with the Ministry’s mandate as well as in our efforts aimed at supporting the initiatives of securing the Nigerian cyberspace, the Honourable Minister directed the Ministerial Standing Committee on Advisory Role for the Protection of Nigerian Cyberspace and ICT Infrastructure to further enhance the cyberspace surveillance activities of the three cybersecurity Centres of the National Information Technology Development Agency (NITDA), Nigerian Communications Commission (NCC) and Galaxy Backbone Limited (GBB).

    It may also be recalled that the Committee, inaugurated by the Honourable Minister on the eve of the Presidential and National Assembly elections, was charged with the following responsibilities, among others:

    Monitoring of Telecommunication Infrastructure for the successful conduct of the 2023 General Elections:

    1. Developing and implementing plans to enhance the resilience of critical digital infrastructure against cyber threats;
    2. Designing procedures and using technologies to prevent, detect, and respond to cyber-attacks, as well as developing the ability to quickly recover from any damage that is done;
    3. Developing a comprehensive risk assessment, analysing the nation’s current cybersecurity capabilities, and identifying gaps that need to be addressed; and
    4. Providing professional advice to the Government on the effective utilisation of digital technologies in the conduct of the 2023 General Elections.

    Based on Honourable Minister’s directives, the Committee provided close oversight on the activities of the cybersecurity Centres, from Friday 17th March, 2023 to Monday 20th March, 2023. During this period and as previously reported, a series of hacking attempts were recorded, including Distributed Denial of Service (DDoS), email and Internet Protocol Spoofing (IPS) attacks, SSH Login Attempts, Brute force Injection attempts, Path Traversal, Detection Evasion, and Forceful Browsing. A total of 3,834,244 attacks were recorded, originating from both within and outside Nigeria. Daily breakdown of these attacks are:

    1. Friday 17th March, 2023:  1,046,896
    2. Saturday 18th March, 2023:  1,481,847
    3. Sunday 19th March, 2023:    327,718
    4. Monday 20th March, 2023:    977,783

    It is interesting to note that the activities of cyberthreat actors on the Nigerian cyberspace during the Gubernatorial and State Assembly elections are much lower than those during the Presidential and National Assembly elections. This is neither surprising nor unexpected as, Nigeria being Africa’s largest democracy, the Presidential and National Assembly elections are bound to attract much attention of everyone, including cyberthreat actors, than during the Gubernatorial and State Assembly elections.

    Furthermore, the Honourable Minister is confident that the implementation of some recommendations as well as measures taken to fortify our cyber defence mechanisms might have helped in this.

    The Honourable Minister reiterates that these attainments would not have been possible without the continued support of President Muhammadu Buhari, GCFR in particular, and the administration in general, towards ensuring Nigeria’s successful transition into the digital economy.

    The digital economy sector has enjoyed Mr President’s unprecedented support and it is highly appreciated.

  • How Hackers Linked to North Korea Stole $3.8 Billion From Crypto Firms

    How Hackers Linked to North Korea Stole $3.8 Billion From Crypto Firms

    A record $3.8 billion worth of cryptocurrency was stolen from various services last year, with much of those thefts driven by North Korean-linked hackers, according to a report Wednesday from blockchain analytics firm Chainalysis.

    The increase in crypto heists, from $3.3 billion in 2021, came as the overall market for cryptocurrencies suffered significant declines. The value of Bitcoin, for example, fell by more than 60% last year.

    North Korea was a key driver for the surge in thefts, according to the report. Hackers linked to the country stole an estimated $1.7 billion worth of crytopcurrency through various hacks in 2022, up from $429 million in the prior year, Chainalysis said.

    Some of the biggest crypto hacks of the year have since been attributed to North Korea. The FBI has blamed hackers linked to the North Korean government for more than $600 million hack of video game Axie Infinity’s Ronin network in March and a $100 million Harmony, a cryptocurrency firm, in June.

    “North Korea’s total exports in 2020 totalled $142 million worth of goods, so it isn’t a stretch to say that cryptocurrency hacking is a sizable chunk of the nation’s economy,” Chainalysis noted in the report.

    US officials worry Pyongyang will use money stolen from crypto hacks to fund its illicit nuclear and ballistic weapons program. North Korean hackers have stolen the equivalent of billions of dollars in recent years by raiding cryptocurrency exchanges, according to the United Nations.

    In addition to hacking cryptocurrency firms, suspected North Koreans have posed as other nationalities to apply for work at such firms and send money back to Pyongyang, US agencies have publicly warned.

    In general, decentralized finance (DeFi) protocols were the main target of hackers, accounting for more than 80% of all cryptocurrency stolen for the year, according to the report. These protocols are used to replace traditional financial institutions with software that allows users to transact directly with each other via the blockchain, the digital ledger that underpins cryptocurrencies.

    Of the attacks on DeFi systems, 64% targeted cross-chain bridge protocols, which allow users to exchange assets between different blockchains. Bridge services typically hold large reserves of various coins, making them targets for hackers. (The thefts on Axie Infinity and Harmony were both bridge hacks.)

    While crypto hacks continued to rise last year, there is some cause for hope. Law enforcement and national security agencies are expanding their abilities to combat digital criminals, such as the FBI’s recovery of $30 million worth of cryptocurrency stolen in the Axie Infinity hack.

    Those efforts, combined with other agencies cracking down on money laundering techniques, “means that these hacks will get harder and less fruitful with each passing year,” according to Chainalysis.

  • Fraudsters Access Over 30,000 PayPal Customer Accounts Using Login Credentials

    Fraudsters Access Over 30,000 PayPal Customer Accounts Using Login Credentials

    According to a Data Breach Notification report, a total of 34,942 PayPal users were affected by the data breach which saw their login details compromised. PayPal linked the privacy breach to activities of ‘unauthorized parties’ who fraudulently accessed private accounts using customer login credentials.

    On how they operated, PayPal noted that whoever got into the accounts had probably gotten details of the victim’s account details like usernames and passwords from another site where the victims reused the same login details thus advising on why it’s important to use a unique password per site or app.

    According to the letter sent on January 18, 2023, to PayPal users, the payment platform noted that the abnormality was first discovered on December 20, 2022.

    After investigations, PayPal discovered the unauthorized activity occurred between December 6, 2022, and December 8, 2022, when the platform eliminated access for unauthorized third parties.

    It added “We have no information suggesting that any of your personal information was misused as a result of this incident, or that there are any unauthorized transactions on your account. There is also no evidence that your login credentials were obtained from any PayPal systems.

    Some of the customer details exposed during the breach included customers’ names, addresses, Social Security numbers, individual tax identification numbers, and dates of birth.

    On the actions taken since it discovered the breach, PayPal said “Upon learning about this unauthorized activity, we promptly began an investigation and took action to address this incident, including by taking steps to prevent unauthorized actors from obtaining further personal information. We reset the passwords of the affected PayPal accounts and implemented enhanced security controls that will require you to establish a new password the next time you login to your account.”

    The platform also announced it had secured the services of Equifax, a credit monitoring firm, to provide identity monitoring services at no cost to users for two years.

  • How 37 Million T-Mobile Customers Were Hacked

    How 37 Million T-Mobile Customers Were Hacked

    T-Mobile said a “bad actor” accessed personal data from 37 million current customers in a November data breach.

    In a regulatory filing Thursday, the company said the hacker stole customer data that included names, billing addresses, emails, phone numbers, dates of birth, T-Mobile account numbers and information describing the kind of service they have with the wireless carrier. T-Mobile said no social security numbers, credit card information, government ID numbers, passwords, PINs or financial information were exposed in the hack.

    Nevertheless, that information can be compiled with other stolen or publicly available information and used by scammers to steal people’s identities or money. T-Mobile said it is working with law enforcement and has begun to notify customers whose information may have been breached.

    The wireless carrier didn’t indicate what it might do to remedy the situation. It noted that it could be on the hook for “significant expenses” because of the hack, although the company said it doesn’t expect the charges will have a material effect on T-Mobile’s bottom line.

    After T-Mobile learned about the data breach, the company said it hired an external cybersecurity team to investigate. T-Mobile was able to discover the source of the breach and stop it a day after the hack was discovered. The company says it continues to investigate the breach but believes it is “fully contained.” It also noted T-Mobile s systems and network do not appear to have been hacked.

    “Protecting our customers’ data remains a top priority,” T-Mobile said in a statement. “We will continue to make substantial investments to strengthen our cybersecurity program.”

  • Hacker Who Stole Singer’s Unreleased Music Jailed Published

    Hacker Who Stole Singer’s Unreleased Music Jailed Published

    A hacker who stole two unreleased songs from Ed Sheeran and sold them on the dark web has been jailed for 18 months.

    Adrian Kwiatkowski traded the music by Sheeran and 12 songs by rapper Lil Uzi Vert in exchange for cryptocurrency.

    The 23-year-old, from Ipswich, managed to get hold of them after hacking the performers’ digital accounts, the Crown Prosecution Service said.

    Kwiatkowski admitted 19 charges, including copyright infringement and possessing criminal property.

    He had made £131,000 from the music, City of London Police said.

    Ipswich Crown Court heard that when the defendant’s Apple Mac laptop was searched, 565 audio files, including the songs by Sheeran and Vert, were uncovered.

    Spirdark alias

    An investigation was initially launched by US authorities in 2019.

    It came after the management of several musicians reported to the New York District Attorney that someone known online as Spirdark had hacked a number of accounts and was selling the content.

    The investigation linked the email address used to set up Spirdark’s cryptocurrency account to Kwiatkowski. His home address in the UK was also linked to an IP address used to hack one of the devices.

    The case was then referred to the City of London Police and Kwiatkowski was arrested in September 2019.

    According to police, seven devices, including a hard drive that contained 1,263 unreleased songs by 89 artists, were seized.

    A document saved on the hard drive summarised the method he had used to obtain them along with a stash of Bitcoin which was seized.

    Chief crown prosecutor Joanne Jakymec said Kwiatkowski had “complete disregard” for the musicians’ creativity, hard work and lost earnings.

    “He selfishly stole their music to make money for himself by selling it on the dark web,” she said.

    “We will be pursuing ill-gotten gains from these proceeds of crime.”

    In August, Kwiatkowski pleaded guilty at Ipswich Magistrates Court to three charges of unauthorised access to computer material, 14 charges of selling copyrighted material, one charge of converting criminal property and two charges of possession of criminal property.

    He also admitted receiving bitcoin cryptocurrency for the songs.

    Detective Constable Daryl Fryatt said Kwiatkowski was highly skilled but it was unfortunate he used his talents unlawfully.

    “Not only did he cause several artists and their production companies significant financial harm, he deprived them of the ability to release their own work,” he added.

    Manhattan District Attorney Alvin Bragg Jr said the case showed “cybercrime knows no borders”.

    “This individual executed a complex scheme to steal unreleased music in order to line his own pockets,” he said.

  • How Ukrainian Hackers Created Fake Profiles of Attractive Women to Trick Russian Soldiers into Sharing their Location

    How Ukrainian Hackers Created Fake Profiles of Attractive Women to Trick Russian Soldiers into Sharing their Location

    The hackers set up fake social-media accounts and posed as attractive women, the FT said.The hackers said the soldiers sent them pictures, which they geolocated and sent to the military.

    Ukrainian hackers set up fake accounts of attractive women to trick Russian soldiers into sending them photos, which they located and passed to the Ukrainian military, the Financial Times reported.

    Nikita Knysh, a 30-year-old IT professional from Kharkiv, told the FT that when Russia’s invasion began in february 2022 he wanted to use his hacking skills to help his country.

    He recruited other hackers and founded a group nicknamed Hackyourmom, which now consists of 30 hackers from across the country, he told the FT.

    Last month, he said they duped Russian soldiers in Melitopol by creating fake accounts and pretending to be attractive women on several social media platforms, including Telegram.

    The hackers were able to get to know Russian soldiers and ultimately convince them to send photos of them on the front, Knysh told the FT.

    “The Russians, they always want to fuck,” Knysh told the FT. “They send [a] lot of shit to ‘girls,’ to prove that they are warriors.”

    Once the soldiers sent pictures, the hackers were able to identify that they had been taken from a remote Russian military base near occupied Melitopol in southern Ukraine, the FT reported.

    They transferred the information over to Ukraine’s military, and several days later the base was attacked, Knysh told the FT

    “My first thought was I am effective, I can help my country,” another team member on Hackyourmom, identified only as Maxim, told the FT. “Then, I realized, I want more of this I want to find more bases, again and again.”

    The Ukrainian online news site Ukrainian Pravda reported last month that there was an explosion at a large Russian military base in Melitopol, citing its mayor, Ivan Fedorov.

    Insider was unable to independently verify the hacker’s claims of involvement, and the Armed Forces of Ukraine did not immediately respond to Insider’s request for comment. The FT said Ukrainian officials declined to discuss hackers’ roles in the attack on that military base.

    Russia’s invasion of Ukraine has prompted an unprecedented cyber war, with hackers on both sides launching attacks.

    At the beginning of the invasion, Ukraine’s digital minister asked civilians with digital talents to join the country’s IT army.

    During Russia’s Victory Day military celebrations in May, major Russian television channels were hacked to display anti-war messages.

    Knysh told the FT that his team had participated in other hacks, including leaking the databases of Russian military contractors and tricking Russian TV stations into playing news clips about Ukrainian civilian casualties.

    “For me, this felt like combat,” Knysh told the FT. “With no money, with no brilliant software, and even no brilliant hacks you can use fraudsters, the dark web against your enemy.”

  • How Our Result Portal was Attacked by Hackers from Asia During Ekiti, Osun Guber Polls – INEC

    How Our Result Portal was Attacked by Hackers from Asia During Ekiti, Osun Guber Polls – INEC

    The Independent National Electoral Commission (INEC) says its result viewing (IReV) portal has come under attack from hackers across the world.

    Mahmood Yakubu, INEC chairman, said this while delivering a keynote address at a stakeholders’ conference on election result management on Friday in Abuja.

    The conference was organised by YIAGA Africa, a civil society organisation (CSO), to launch the election result analysis dashboard (ERAD) report agenda.

    Yakubu said the commission has recorded several attempts to hack the cyber security system of the result viewing portal.

    “Another technical concern for us is the repeated attempts to break through our cyber security system for the portal,” he said.

    “Our engineers reported several cyberattacks on the portal during the Ekiti and Osun governorship elections, some of them from as far as Asia. I am glad to note that all of them failed.

    “However, while we are confident in the security solutions that we have deployed for IReV and all our web presence, we must remain vigilant and continue to strengthen our defences. We have tasked our engineers to do everything possible to fully protect the IReV and all our web resources.”

    Yakubu also stated that INEC is working to address other challenges which are administrative in nature.

    “For example, we found that some of the low-quality uploads that occurred in the field, which some of the observers have also noted, were due to the unavailability or substitution of presiding officers that were trained prior to the elections,” he said.

    “We shall administratively deal with this challenge and ensure that only adequately trained Presiding Officers are deployed for elections.

    “Also, more hands-on training may be required to ensure that all those involved throughout the value chain of the IReV are fully ready for what is bound to be a major outing during the 2023 general election.” ides from challenges, the INEC chairman noted that the commission has introduced new legal provisions, administrative procedures and technological innovations to improve election conduct in 2023.

  • Chinese Hackers Deploy Fake News Site To Infect Government, Energy Targets

    Chinese Hackers Deploy Fake News Site To Infect Government, Energy Targets

    A Chinese cyber espionage group has been using a fake news site to infect government and energy industry targets in Australia, Malaysia and Europe with malware, according to a blog posted online Tuesday by Proofpoint and PwC Threat Intelligence.

    The group is known by several names, including APT40, Leviathan, TA423 and Red Ladon. Four of its members were indicted by the U.S. Department of Justice in 2021 for hacking a number of companies, universities and governments in the United States and worldwide between 2011 and 2018.

    The group is using its fake Australian news site to infect visitors with the ScanBox exploitation framework. “ScanBox is a reconnaissance and exploitation framework deployed by the attacker to harvest several types of information, such as the target’s public-facing IP address, the type of web browser used and its configuration,” explained Proofpoint Vice President for Threat Research and Detection Sherrod DeGrippo.

    “This serves as a setup for the stages of information gathering that follow and potential follow-on exploitation or compromise, where malware could be deployed to gain persistence on the victim’s systems and allow the attacker to perform espionage activities,” she told TechNewsWorld.

    “It creates an impression of the victim’s network that the actors then study and decide the best route to take to achieve further compromise,” she said.

    “Watering Hole” attacks that use ScanBox appeal to hackers because the point of compromise isn’t within a victim’s organization, added John Bambenek, a principle threat hunter at Netenrich, a San Jose, Calif.-based IT and digital security operations company.

    “So, there is difficulty detecting that information is being discretely stolen,” he told TechNewsWorld.

    Modular Attack

    According to the Proofpoint/PwC blog, the TA423 campaign primarily targeted local and federal Australian government agencies, Australian news media companies, and global heavy industry manufacturers which conduct maintenance of fleets of wind turbines in the South China Sea.

    It noted that phishing emails for the campaign were sent from Gmail and Outlook email addresses, which Proofpoint believes with “moderate confidence” were created by the attackers.

    Subject lines in the phishing emails included “Sick Leave,” “User Research,” and “Request Cooperation.”

    The threat actors would frequently pose as an employee of the fictional media publication “Australian Morning News,” the blog explained, and provide a URL to their malicious domain, soliciting targets to view their website or share research content that the website would publish.

    If a target clicked the URL, they’d be sent to the fake news site and be served up, without their knowledge, the ScanBox malware. To give their bogus website credibility, the adversaries posted content from legitimate news sites, such as the BBC and Sky News.

    ScanBox can deliver its code in two ways: in a single block, which gives an attacker access to the malware’s full functionality immediately, or as a plug-in, modular architecture. The TA423 crew chose the plug-in method.

    According to PwC, the modular route can help avoid crashes and errors that would alert a target that their system is under attack. It’s also a way to reduce the visibility of the attack to researchers.

    Surge in Phishing

    As these kinds of campaigns show, phishing remains the tip of the spear used to penetrate many organizations and steal their data. “Phishing sites have seen an unexpected surge in 2022,” observed Monnia Deng, director of product marketing at Bolster, a provider of automated digital risk protection, in Los Altos, Calif.

    “Research has shown that this problem has skyrocketed tenfold in 2022 because this method is easy to deploy, effective and a perfect storm in a post-pandemic digital era of work,” she told TechNewsWorld.

    DeGrippo maintained that phishing campaigns continue to work because threat actors are adaptive. “They use current affairs and overall social engineering techniques, many times preying off a target’s fears and sense of urgency or importance,” she said.

    A recent trend among threat actors, she continued, is attempting to increase the effectiveness of their campaigns by building trust with intended victims through extended conversations with individuals or through existing conversation threads between colleagues.

    Roger Grimes, a defense evangelist with KnowBe4, a security awareness training provider, in Clearwater, Fla. asserted that social-engineering attacks are particularly resistant to technical defenses.

    “Try as hard as we might, so far, there have been no great technical defenses that prevent all social engineering attacks,” he told TechNewsWorld. “It’s particularly hard because social engineering attacks can come over email, phone, text message, and social media.

    Even though social engineering is involved in 70% to 90% of all successful malicious cyberattacks, it’s the rare organization that spends more than 5% of its resources to mitigate it, he continued.

    “It’s the number one problem, and we treat it like a small part of the problem,” he said. “It’s that fundamental disconnect that allows attackers and malware to be so successful. As long as we don’t treat it as the number one problem, it will continue to be the primary way that attackers attack us. It’s just math.”

    Two Things To Remember

    While TA423 used email in its phishing campaign, Grimes noted that adversaries are moving away from that approach.

    “Attackers are using other avenues, such as social media, SMS text messages, and voice calls more often to do their social engineering,” he explained. “That’s because many organizations focus almost exclusively on email-based social engineering and the training and tools to fight social engineering on the other types of media channels are not at the same level of sophistication in most organizations.”

    “That is why it is crucial that every organization create a personal and organizational culture of healthy skepticism,” he continued, “where everyone is taught how to recognize the signs of a social engineering attack no matter how it arrives — be it email, web, social media, SMS message or phone call — and no matter who it appears to be sent by.”

    He explained that most social engineering attacks have two things in common. First, they arrive unexpectedly. The user wasn’t expecting it. Second, it’s asking the user to do something the sender — whomever they are pretending to be — has never asked the user to do before.

    “It could be a legitimate request,” he continued, “but all users should be taught that any message with those two traits is at a far higher risk of being a social engineering attack, and should be verified using a trusted method, such as directly calling the person on a known good phone number.”

    “If more organizations taught the two things to remember,” he said, “the online world would be a far safer place to compute.”

hacklink masterbetting masterbetting giriş masterbetting güncel giriş betoffice betoffice giriş betoffice güncel giriş galabet galabet giriş galabet güncel giriş casivera casivera giriş casivera güncel giriş vaycasino vaycasino giriş vaycasino güncel giriş betlike giriş betlike betlike güncel giriş atlasbet güncel giriş atlasbet giriş atlasbet güncel atlasbet trendbet trendbet giriş trendbet güncel trendbet trendbet giriş trendbet güncel trendbet güncel giriş betixir giriş betixir betixir güncel betixir güncel giriş betixir betixir güncel betixir giriş betixir güncel giriş wbahis wbahis giriş wbahis giriş wbahis güncel wbahis güncel giriş enbet enbet enbet giriş enbet güncel enbet güncel giriş enbet enbet giriş enbet güncel enbet güncel giriş casinolevant casinolevant giriş casinolevant güncel casinolevant güncel giriş casinolevant casinolevant giriş casinolevant güncel casinolevant güncel giriş setrabet setrabet giriş setrabet güncel setrabet güncel giriş setrabet setrabet giriş setrabet güncel setrabet güncel giriş tlcasino tlcasino giriş tlcasino güncel giriş masterbetting masterbetting giriş masterbetting güncel giriş royalbet royalbet giriş royalbet güncel betlike betlike giriş betlike güncel giriş betticket betticket giriş betticket güncel giriş betoffice betoffice giriş betoffice güncel giriş casival casival giriş casival güncel giriş casivera casivera giriş casivera güncel giriş vaycasino vaycasino giriş vaycasino güncel giriş enbet enbet giriş enbet güncel enbet güncel giriş enbet enbet giriş enbet güncel güncel casinolevant casinolevant giriş casinolevant güncel casinolevant güncel giriş casinolevant casinolevant giriş casinolevant güncel giriş wbahis wbahis giriş wbahis güncel wbahis güncel giriş wbahis wbahis giriş wbahis güncel giriş vidobet vidobet vidobet giriş vidobet güncel giriş vidobet güncel giriş vidobet güncel giriş vidobet vidobet giriş vidobet güncel vidobet güncel giriş betasus betasus giriş betasus güncel betasus güncel giriş betasus betasus giriş betasus güncel giriş betasus güncel betasus betasus giriş betasus güncel betasus güncel giriş betasus betasus giriş betasus güncel betasus güncel giriş tlcasino tlcasino giriş tlcasino güncel giriş galabet galabet giriş galabet güncel giriş wbahis wbahi giriş wbahis güncel wbahis güncel giriş wbahis wbahis giriş wbahis güncel wbahis güncel giriş betasus betasus giriş betasus güncel betasus güncel giriş betasus betasus giriş betasus giriş betasus güncel giriş betasus güncel tlcasino tlcasino giriş tlcasino güncel giriş betticket betticket giriş betticket güncel giriş betasus betasus giriş betasus güncel betasus güncel giriş betasus betasus giriş betasus güncel betasus güncel giriş betlike betlike giriş betlike güncel giriş royalbet royalbet giriş royalbet güncel giriş masterbetting masterbetting giriş masterbetting güncel giriş casinolevant casinolevant giriş casinolevant güncel giriş casival casival giriş casival güncel giriş pashagaming pashagaming giriş pashagaming güncel giriş atlasbet atlasbet giriş atlasbet güncel atlasbet güncel giriş atlasbet atlasbet giriş atlasbet güncel atlasbet güncel giriş enbet enbet giriş enbet güncel enbet güncel giriş