Tag Archive for: Secrets

Revealing Malware Secrets in a Digital World #POST 47 | by Monty Excel | Dec, 2023


Have you ever wondered about the invisible dangers that exist in the digital world, waiting to compromise your device and personal information?

Malware, a portmanteau of malicious software, is a broad term encompassing various types of harmful programs designed to infiltrate, damage, or disrupt computer systems. In this article, we’ll delve into different malware types, demystifying these digital threats with real-world examples.

Source…

Hackers spent 2+ years looting secrets of chipmaker NXP before being detected


A cartoon man runs across a white field of ones and zeroes.

A prolific espionage hacking group with ties to China spent over two years looting the corporate network of NXP, the Netherlands-based chipmaker whose silicon powers security-sensitive components found in smartphones, smartcards, and electric vehicles, a news outlet has reported.

The intrusion, by a group tracked under names including “Chimera” and “G0114,” lasted from late 2017 to the beginning of 2020, according to Netherlands national news outlet NRC Handelsblad, which cited “several sources” familiar with the incident. During that time, the threat actors periodically accessed employee mailboxes and network drives in search of chip designs and other NXP intellectual property. The breach wasn’t uncovered until Chimera intruders were detected in a separate company network that connected to compromised NXP systems on several occasions. Details of the breach remained a closely guarded secret until now.

No material damage

NRC cited a report published (and later deleted) by security firm Fox-IT, titled Abusing Cloud Services to Fly Under the Radar. It documented Chimera using cloud services from companies including Microsoft and Dropbox to receive data stolen from the networks of semiconductor makers, including one in Europe that was hit in “early Q4 2017.” Some of the intrusions lasted as long as three years before coming to light. NRC said the unidentified victim was NXP.

“Once nested on a first computer—patient zero—the spies gradually expand their access rights, erase their tracks in between and secretly sneak to the protected parts of the network,” NRC reporters wrote in an English translation. “They try to secrete the sensitive data they find there in encrypted archive files via cloud storage services such as Microsoft OneDrive. According to the log files that Fox-IT finds, the hackers come every few weeks to see whether interesting new data can be found at NXP and whether more user accounts and parts of the network can be hacked.”

NXP did not…

Source…

This Cryptomining Tool Is Stealing Secrets


As the Israel-Hamas war raged on this week and Israel expanded its ground invasion of the Gaza Strip, the territory’s compromised internet infrastructure and access to connectivity went fully dark on Friday, leaving Palestinians without access to ground or mobile data connections. Meanwhile, researchers are bracing for the fallout if Hamas makes good on its threats to distribute hostage execution videos online. And TikTokkers are using a niche livestreaming feature and exploiting the Israeli-Hamas conflict to collect virtual gifts from viewers, a portion of which goes to the social media company as a fee.

As the worst mass shooting in Maine’s history unfolded this week and the gunman remained at large, disinformation about the situation and the suspect flooded social media, adding to the already chaotic and horrific situation. Elon Musk, the owner of X (formerly Twitter) posted remarks earlier this month mocking Ukrainian president Vlodymr Zelensky that were met with a flood of support and enthusiasm from Russian trolls and accounts distributing pro-Russia propaganda.

The US federal foreign intelligence collection tool—a frequently abused surveillance authority—known as Section 702 is facing its demise at the end of the year despite being viewed as the “crown jewel” of US surveillance powers. So far, no members of Congress have introduced a bill to prevent its January 1 sunset. And the identity-management platform Okta suffered a breach that had implications for nearly 200 of its corporate clients and brought up memories of a similar hack the company suffered last year that also had knock-on effects for customers.

An EU government body has been pushing a controversial proposal with far-reaching privacy implications in an attempt to combat child sexual abuse material, but its most outspoken advocates recently added to the drama significantly by essentially launching an influence campaign to support its passage. The long-foreseen nightmare of using generative AI to create digital child abuse materials has arrived with a flood of images, some of which are completely fabricated while others depict real victims generated from old datasets.

We also went deep this week on a…

Source…

Ministry of Defence hit by Russia-linked hackers as security secrets are leaked in data posted online


THE Ministry of Defence has been hit by hackers with links to Russia, as security secrets have been leaked and the data posted online.

Hackers have released thousands of pages of information with could be used by criminals to access the HMNB Clyde nuclear submarine base, the Porton Down chemical weapons lab and a GCHQ listening post.

The Royal Navy’s Trident-class nuclear submarine Vanguard

2

The Royal Navy’s Trident-class nuclear submarine VanguardCredit: s

Information concerning high-security prisons and a military site key to our cyber defences was also stolen in the raid by group LockBit.

Hackers are said to have targeted the databases of Zaun, a firm which makes the fences for maximum security sites.

The information was published on the internet’s dark web, which can be accessed with specialist software.

It’s thought the information was stolen last month during an attack on the firm based in the West Midlands, according to a report by the Mirror.

I'm a cyber crime expert, how to avoid latest scams like sneaky WhatsApp trick
I’m a cyber expert and there’s 2 websites you must never search for

LockBit is regarded as the world’s most dangerous hacking gang with its keys suspects listed on the FBI’s Most Wanted list.

It’s thought they are responsible for 1,400 attacks on global targets.

The group is also allegedly behind a £66million blackmail attempt on the Royal Mail – with the postal service refusing to cave in to their demands.

A number of Russian nationals have been accused of cyber attacks and held in both the United States and Canada.

LockBit is said to have financial connections to Russian gangsters.

One document which was leaked relates to specific equipment bought to protect Porton Down in Wiltshire.

Zaun describes its work there as “very secretive”.

Another leaked document posted on the dark web is a sales order detailing goods purchased for HMNB Clyde – also known as Faslane – which is home to Trident nuclear subs.

Other documents include a sales order report for equipment at GCHQ’s communications complex in Bude, Cornwall, as well as security equipment at RAF Waddington in Lincolnshire, where the Reaper attack drones squadron is based, and Cawdor Barracks, the base of the 14th Signal Regiment, which deals in electronic warfare.

Detailed drawings for perimeter fencing at Cawdor, in Pembrokeshire, were attached to company emails.

Paperwork…

Source…