Tag Archive for: websites

Anonymous Hackers Successfully Hack More Russian Websites


KEY POINTS

  • Anonymous took down the websites of Russia’s Customs Service and Goodstom
  • The collective last week successfully hacked a Russian UAV
  • It had also hacked a Russian law firm and obtained confidential client information

Anonymous, the decentralized hacktivist collective and movement which declared a cyberwar against Russia for its invasion of Ukraine, has launched another series of attacks on Russian websites. 

On Monday, the hacking collective announced it successfully took down the Federal Customs Service of Russia as well as goodstom.ru, a website belonging to the dental clinic Khoroshaya Stomatologiya located in Saint Petersburg. 

The latest attack comes months after Anonymous in April declared it will continue to hack and release confidential information until Russia stops the war in Ukraine.

“The hacking will continue until Russia stops their aggression,” the collective said in a tweet published in early April.

The cyber attack against Russia’s customs website and Goodstom also comes after the group successfully hacked a Russian Unmanned Aerial Vehicle (UAV) last week. The attack gave Anonymous access to the Kremlin’s tactics and plans, which were later uploaded to AnonFiles by a hacker going by the name “Spider” and made accessible to the public.

The operative, who previously took down Belarus’ Ministry of Internal Affairs website, warned Putin to “expect” more attacks from the collective for the “war crimes” that Russians have committed during the war. 

“We will expose you and the war crimes you have committed. We will share the crimes of your corrupt government,” @Youranonspider told the International Business Times in an exclusive interview. “We are in the electronic car navigation system. We are Anonymous. We are Legion. We don’t forgive. We do not forget. Expect us.”

On June 8, Anonymous announced hacking a top Russian law firm, Rustam Kurmaev and Partners (RKP), and released one terabyte of data, including information that would have remained hidden from the public under attorney-client privileges such as emails and court files. The law firm’s list of clients included Ikea, Volkswagen Group Russia, Toyota Russia, Panasonic, Abbott…

Source…

DarkOwl Ransomware API offers insight into content from ransomware websites hosted on the darknet


DarkOwl released Ransomware API, the latest in their suite of darknet products. By enabling users to monitor darknet ransomware sites for their strategic assets – including first and third party vendors – organizations have the most accurate information available as to whether an entity has been extorted or compromised in a ransomware attack.

Ransomware API accesses the same database of darknet content as DarkOwl’s other data products, but targets results to content that was posted on ransomware group websites. These sites include those where actors post about their victims, and frequently leak compromised data that resulted from their attacks. Using this data, a company could expose potential risk for their own organization, assess supply chain vendor risk, or calculate risk to support cybersecurity insurance underwriting processes.

“As ransomware actors become ever more prevalent and advanced in the darknet, companies need tools that allow them to monitor and stay ahead of any cyberattacks. We hope that our deep coverage of this space can help illuminate a criminal economy that is constantly shifting and evolving,” said Mark Turnage, President and CEO of DarkOwl.

DarkOwl’s newest product was developed as a direct result of market demand, and is the first in the industry to offer streamlined, targeted insight into ransomware-hosted content on the darknet. As stated by DarkOwl’s Director of Product Technology, Sarah Prime, “We’re excited to release this new endpoint as a response to what we were hearing from our customers. Our insight into this area of darknet is unique, particularly our historical archive. Through this API product, organization mentions on these sites can now serve as a critical risk indicator.”

Source…

Mobile security specialist, Corrata, discovers weak encryption on major websites when accessed using iOS devices | News


DUBLIN, May 17, 2022 /PRNewswire/ — Mobile threat defense solution provider, Corrata, today announced the discovery of poor encryption practices on a number of major websites including Irish telecoms company Eir and German newspaper Bild.  In line with its responsible disclosure practice, Corrata contacted the owners of the websites concerned and the weaknesses have now been remedied.  However it is likely that other websites contain similar vulnerabilities and Corrata urges website owners to make sure that their encryption is in line with industry best practice.

Today the vast majority of websites use encryption to ensure that sensitive data exchanges between users and the website remain confidential.  This confidentiality depends on the use of an internet protocol known as Transport Layer Security (TLS). HTTPS is the implementation of TLS used when browsing websites.  Its use is usually signalled by the appearance of the lock symbol at the top left hand corner of the browser address bar. 

However not all website implementations of https are equally secure.  Some websites use out of date versions of the protocol which are known to be vulnerable to hacking.  This is particularly risky when using Wifi networks because the traffic passing between a mobile phone and a Wifi access point can easily be spied upon.  Internet users rely on the fact that sensitive data is transmitted in encrypted form to combat such spying.  However where weak encryption is used it will fail to protect sensitive data such as passwords, financial information and other confidential data.

The specific weakness discovered by Corrata related to a misconfiguration of the sites’ web servers to favor an old insecure cipher called RC4 when accessed using iOS devices (iPhones and iPads).   Vulnerabilities in this cipher make it vulnerable to hacking and website owners have been strongly advised not to use it for at least ten years.  Devices with Corrata’s mobile threat defense solution installed automatically detect these flaws and prevent users’ data being stolen. It is these routine checks which brought the vulnerability to light. 

About Corrata

Corrata are global leaders…

Source…

Russian government websites face ‘unprecedented’ wave of hacking attacks, ministry says


“We are recording unprecedented attacks on the websites of government authorities,” the statement said. “If their capacity at peak times reached 500 GB earlier, it is now up to 1 TB. That is, two to three times more powerful than the most serious incidents of this type previously recorded.”

Wednesday evening, the Russian Emergency Situations Ministry website was defaced by hackers, who altered its content. Notably, the hack replaced the department hotline with a number for Russian soldiers to call if they want to defect from the army — under the title “Come back from Ukraine alive.”

Top news items on the ministry’s front page were changed to “Don’t believe Russian media — they lie” and “Default in Russia is near,” along with a link offering “full information about the war in Ukraine.”

Also Wednesday, insults aimed at President Vladimir Putin and Russians over the situation in Ukraine were added to dozens of Russian judicial websites.

Under recent Russian laws against spreading “fake news about the military,” the use of the words “war” or “invasion” to describe what the Kremlin calls a “special military operation in Ukraine” is punishable with hefty fines and years in prison.

A few days after Russia began its attack on Ukraine, the state-run news agency Tass was hacked and defaced with an ad urging people to “take to the streets against the war.”

Russia’s main public services portal, Gosuslugi, had sustained more than 50 crippling denial-of-service attacks, the Russian Communications Ministry said on Feb. 26.

In early March, multiple other websites were hacked, including the Ministry of Culture, the Federal Penitentiary Service and the Internet regulator Roskomnadzor.

Source…