Tag Archive for: credentials

Govt. Agencies Seize Domains Used for Selling Credentials


Cybercrime
,
Cybercrime as-a-service
,
Fraud Management & Cybercrime

DOJ: Now-Shuttered Site Sold Data Obtained from 10,000 data breaches

Govt. Agencies Seize Domains Used for Selling Credentials

The U.S. Department of Justice and the FBI announced that it has seized three domains after an international investigation that found these domains selling stolen personal information and providing access to conduct distributed denial-of-service attack on victim networks.

See Also: OnDemand | Understanding Human Behavior: Tackling Retail’s ATO & Fraud Prevention Challenge

The three seized internet domain names include weleakinfo.to and two related domain names, ipstress.in and ovh-booter.com.

“Today, the FBI and the Department stopped two distressingly common threats: websites trafficking in stolen personal information and sites which attack and disrupt legitimate internet businesses,” says Matthew M. Graves, U.S. Attorney for the District of Columbia. “Cybercrime often crosses national borders. Using strong working relationships with our international law enforcement partners, we will address crimes like these that threaten privacy, security, and commerce around the globe.”

WeLeakInfo.to Website

The site operated as a database and search engine, with the stolen data indexed so that users could search the files and information “illegally obtained in over 10,000 data breaches containing seven billion indexed records – including, for example, names, email addresses, usernames, phone numbers, and passwords for online accounts,” the DOJ…

Source…

Windows malware can steal social media credentials and banking logins


Many pieces of personal information are valuable to hackers and scammers. Your Social Security number can spell lots of trouble in the wrong hands. Your credit card and banking information is highly sought after, too, as criminals can drain your account in seconds.

But one of the most lucrative data points for any cybercriminal is your social media details. By hacking into your account, criminals can spread malware to your contacts, trick them out of money and use it for other illegal activities.

Now, criminals are targeting your Windows PC. Read on for details and ways to stay protected.

Here’s the backstory

While old malware is often recycled into updated versions, hackers constantly create new methods to steal details and information. Security researchers at Zscaler recently made such a discovery, calling the new malware Win32.PWS.FFDroider.

The malware creates a registry entry in Windows-based computers to steal login credentials and internet browser cookies. The research team noted that the FFDroider malware spreads through illegal copies of Study Math Live and other freeware installers.

Zscaler was able to determine that FFDroider can:

  • Steal your browser cookies and send them to a central server.
  • Read through your cookies, looking for social media login credentials.
  • Access the safelists rules in Windows to make copies of itself.

The latest threats don’t stop there. Another malware variant feature is infiltrating your social media accounts and using your Facebook Ads Manager details for malicious advertising or stealing your banking information. Hackers can also tunnel through Instagram to extract personal data.

FFDroider disguises itself as the hugely popular chatting application Telegram to avoid detection.

While it’s not new, another malware variant is spreading at an alarming pace. Microsoft recently put measures in place to prevent the dangerous Qbot malware from replicating through Microsoft Office files.

Hackers are now adapting the malware to spread through MSI Windows Installer packages. Once installed,…

Source…

Phases of Russia’s hybrid war. Stone Panda’s back. Bogus sites harvest credentials. Stone Panda’s back. CISA issues guidance.


Dateline Moscow, Kyiv, Prague, Berlin, Brussels, London, New York, Washington: a lull in maneuver, but a continuation of fire (and cyber ops).

Ukraine at D+41: Russia reconstitutes maneuver forces; expect fire and cyber. (The CyberWire) Infantry and armor withdraw from the north of Ukraine, but Russian artillery continues its reduction of such Ukrainian cities as are within range. Cyber operations continue, and Ukraine is apparently getting some help from abroad (at least some defensive help).

Live Updates: U.N. Security Council to Meet as Evidence of War Crimes Mounts (New York Times) China and Russia are unlikely to support any measures that France, the U.S. and Britain propose. European leaders sought to impose more sanctions, but were divided on whether to ban Russian natural gas.

When It Comes to U.N. Diplomacy, Not All Abstentions Are Equal (World Politics Review) Abstentions at the U.N. may seem like a way to avoid hard choices on tough crises. But U.N. diplomacy is rarely that simple. In recent weeks, U.N. members from China to Burkina Faso have abstained on votes in U.N. forums on the war in Ukraine, or just not voted on them. What do such ambiguous votes and nonvotes mean?

Russia-Ukraine war: what we know on day 42 of the Russian invasion (the Guardian) Donetsk governor says Russian artillery has killed civilians at aid point, while Russian governor claims border guards were fired at

Russia’s invasion of Ukraine: List of key events on Day 42 (Al Jazeera) As the Russia-Ukraine war enters its 42nd day, here is a look at the main developments.

Russian military ‘weeks’ from being ready for new push as war takes its toll (The Telegraph) ‘Significant movement’ of troops away from Kyiv to regroup, rearm and resupply as Nato appeals to allies for weapons to reinforce Ukraine

Russia’s failure to take down Kyiv was a defeat for the ages (AP NEWS) Kyiv was a Russian defeat for the ages. The fight started poorly for the invaders and went downhill from there. When President Vladimir Putin launched his war on Feb. 24 after months of buildup on Ukraine’s borders, he sent hundreds of helicopter-borne commandos — the best of the best of Russia’s “spetsnaz” special forces…

Source…