Tag Archive for: hacking

Meta cracks down on cyberespionage, warns of ‘perception hacking’


Meta said it is focused on continuing to disrupt emerging cybersecurity threats, including “perception hacking” efforts that could attempt to create unjustified fears about the security of U.S. elections.

In its new “Quarterly Adversarial Threat Report” released Thursday, Meta details how it took action on two cyberespionage operations and removed three networks that were engaging in coordinated inauthentic behavior (CIB) — campaigns that seek to manipulate public debate.

Since 2017, the company says it has been able to disrupt the activities of coordinated networks aimed at manipulating users with fake accounts using coordinated inauthentic behavior. The efforts have been successful at driving these networks off of Facebook and have made it harder for other entities to maintain access on the social media platform, Meta says.

Meta says in the report that cyberespionage actors tend to target individuals across the internet in an effort “to collect intelligence manipulate them into revealing information and compromise their devices and accounts.”

Meta’s Facebook took action on two separate cyberespionage operations from South Asia this past quarter, both of which used malware to infect users’ devices. One of the operations was from the hacker group known as Bitter APT, the report says.

The hacker group targeted users with malware in New Zealand, India, Pakistan and the United Kingdom, Meta’s report says.

The report also revealed the company had removed networks promoting misinformation and harassment in India, Indonesia, Greece and South Africa.

Additionally, Facebook removed three networks engaged in coordinated inauthentic behavior, including one network linked to an Israeli public relations firm and two troll farms from Malaysia and Russia.

The Russian operation, the self-proclaimed CyberFront Z, focused on targeting global discourse on the war in Ukraine, the report says.

The pro-Russia operation attempted to mirror the anti-war communities defending Ukraine through the use of fake accounts run by paid posters, the report says. Despite the effort, pro-Ukraine and anti-war comments typically outnumbered the pro-Russia group’s comments.

Ahead of the U.S. midterm elections, a spokesperson…

Source…

Meta cracks down on cyberespionage, warns of ‘perception hacking’ ahead of midterm elections


Meta said it is focused on continuing to disrupt emerging cybersecurity threats, including “perception hacking” efforts that could attempt to create unjustified fears about the security of U.S. elections.

In its new “Quarterly Adversarial Threat Report” released Thursday, Meta details how it took action on two cyberespionage operations and removed three networks that were engaging in coordinated inauthentic behavior (CIB) — campaigns that seek to manipulate public debate.

Since 2017, the company says it has been able to disrupt the activities of coordinated networks aimed at manipulating users with fake accounts using coordinated inauthentic behavior. The efforts have been successful at driving these networks off of Facebook and have made it harder for other entities to maintain access on the social media platform, Meta says.

Meta says in the report that cyberespionage actors tend to target individuals across the internet in an effort “to collect intelligence manipulate them into revealing information and compromise their devices and accounts.”

Meta’s Facebook took action on two separate cyberespionage operations from South Asia this past quarter, both of which used malware to infect users’ devices. One of the operations was from the hacker group known as Bitter APT, the report says.

The hacker group targeted users with malware in New Zealand, India, Pakistan and the United Kingdom, Meta’s report says.

The report also revealed the company had removed networks promoting misinformation and harassment in India, Indonesia, Greece and South Africa.

Additionally, Facebook removed three networks engaged in coordinated inauthentic behavior, including one network linked to an Israeli public relations firm and two troll farms from Malaysia and Russia.

The Russian operation, the self-proclaimed CyberFront Z, focused on targeting global discourse on the war in Ukraine, the report says.

PHOTO: The logo of Meta Platforms is seen in Davos, Switzerland, May 22, 2022.

The logo of Meta Platforms is seen in Davos, Switzerland, May 22, 2022.

Arnd Wiegmann/Reuters, FILE

The pro-Russia operation attempted to mirror the anti-war communities defending Ukraine through the use of fake accounts run by paid posters, the report says. Despite the effort, pro-Ukraine and anti-war comments…

Source…

Missile Maker MBDA Refutes Hacking Allegations


European missile maker MBDA has publicly denied some of the hacking allegations against the company made on a dark web forum in July and posted on Twitter by Today Cyber News on Tuesday.

The self-proclaimed hacking group who first made the allegation went under the name “Andrastea,” and claimed to have obtained roughly 60 GB of data from MBDA and then put it for sale on the dark web after breaking into MBDA’s systems.

According to Andrastea, the group would have managed to obtain files describing military projects, alongside information related to commercial activities, contracts, and messages exchanged with other companies, among other things.

MBDA is now refuting these claims, in a series of blog posts (in different languages) published on Monday.

“MBDA is refuting the alleged ‘hacking’ of the company’s information systems, and has filed a report with police of an attempt to blackmail the company,” read one of the posts.

“Following the company’s refusal to yield to this blackmail threat and pay a ransom demand, the criminal group has spread information on the internet, making it accessible for a payment.”

Specifically, the company clarifies that while some files were indeed stolen, the company was not hacked and its security systems remain intact, as the company has “state-of-the-art cyber protection systems” in place to face these kinds of criminal activity.

“The origin of the data has already been ascertained, having been acquired from an external hard drive,” MBDA wrote.

“It has been confirmed that no hacking of the company’s secure networks has occurred. So far, the company’s internal verification processes indicate that the data made available online are neither classified data nor sensitive.”

Further, MBDA said the Italian national authorities are currently investigating the matter, and the company said it is supporting their efforts.

“The company will take all possible legal actions in the face of what is a criminal act of blackmail.”

Source…

Pico CTF Gym – Power Cookie – CTF Training