Quantcast
Channel: Hacking News – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Viewing all 2194 articles
Browse latest View live

Websites of Azerbaijani Embassies Hacked by Armenian Hackers

$
0
0

Armenian hackers from Monte Melkonian Cyber Army – (MMCA) are back in action with yet another high-profile hack. This time the group has hacked and defaced the official website of Azerbaijan Association of judges of specialized courts, Azerbaijan Bank training Center, Azerbaijan embassy in Belgium and Poland.

In an exclusive conversation with one of the representative of MMCA, we were told that the reason behind this attack was to make clear that Artsakh province belongs to Armenia.

All targeted websites were left with a deface page along with a strong message in form of a banner and a YouTube video.

”Artsakh belongs to Armenia! Nakhichevan wait for us! Hacked by Monte Melkonian Cyber Army”, according to the deface message.

Full preview of the deface page along with YouTube video is available below:

The Deface page left by MMCA hackers

The Deface page left by MMCA hackers

Links of all targeted sites along with their mirrors as a proof are available here.

This is not the first time when Armenian hackers from Monte Melkonian Cyber Army – (MMCA) have hacked Azerbaijani sites. In past the group conducted a massive 300GB DDoS attack on Azerbaijani servers along with site defacement. The same group has also been targeting Turkish websites against 1915 Genocide. 

At the same time, Azerbaijani hackers are not far behind. The Anti-Armenia Team in June, 2014 hacked and defaced the official website of Armenian president and other ministries.

At the time of publishing this article, all sites were restored and working online.


The post Websites of Azerbaijani Embassies Hacked by Armenian Hackers appeared first on Hack Read.


Anonymous’ Supporter Hacks India’ National Academy of Customs, Excise & Narcotics Website

$
0
0

A hacker who calls him self an Anonymous Lover (the hacktivist group) and goes with the handle of ‘H34r75 7h!3f’ has hacked and defaced the official website of India‘s National Academy of Customs, Excise & Narcotics (NACEN).

The hacker left a deface page along with a message on the website, bashing the admin for poor security.

The reason for targeting National Academy website was not mentioned anywhere, that leads to the conclusion that it was just a random hack, but considering the importance of the institution; it is impossible to ignore it.

The deface message was expressed in following words:

Dear Admin Your Site Is Not Secure This Message Is Warning For You! Please Secure it. Admin Don’t Hate Me Hate Our Skills ” Just a Security Reminder.”

Full preview of the deface page is available below:

indian-national-academy-of-customs-excise-narcotics-website-hacked

Link of targeted website along with its mirror as a proof of hack is available below:

http://nacen.gov.in/hearts.html
http://zone-h.com/mirror/id/23170604

Here is a screenshot of Google search about the website of Indian National Academy of Customs, Excise & Narcotics.

indian-national-academy-of-customs-excise-narcotics-website-hacked-2

National Academy of Customs Excise & Narcotics (NACEN) is the premier training institute of Government of India. It is under the administrative control of the Central Board of Excise & Customs (CBEC), Department of Revenue, Ministry of Finance, Government of India, according to the ‘About Us‘ page of the website.

The identity of hacker remains unknown, did he got access to any confidential data? that answer can be given by the Academy or the hacker himself. However, it’s been two days that the site got hacked, but at the time of publishing this article the site was still hacked, displaying deface page uploaded by the hacker.


The post Anonymous’ Supporter Hacks India’ National Academy of Customs, Excise & Narcotics Website appeared first on Hack Read.

Iranian Hacker Defaces Website of UAE’s Telecom Regulatory Authority

$
0
0

An Iranian hacker going with the handle of MoHaMaD VaKeR hacked and defaced the official sub-domain of Telecommunications Regulatory Authority (TRA) of United Arab Emirates (UAE), two days ago on 25th Oct, 2014.

The targeted sub-domain reportedly belongs to  IPV6 training forum.

Hacker left a deface page along with a message on hacked domain, bashing the site admin for poor security.

The reason for targeting TRA’s website was not mentioned anywhere, but abusive words against USA and Israel were left in bold letters. This leads to the conclusion that it was just a random hack, but considering the importance of the institution; it is impossible to ignore it.

READ MORE: Website of National Transport Authority UAE hacked & defaced by Saudi hackers

The deface message left by the hacker was expressed in following word:

Hacked by MoHaMaD VaKeR ! Your Security is Very low ! F**k all usa and Israel! Iranian Hackers are The best.

Link of targeted website along with its mirror as a proof of hack is available below:

http://ipv6.tra.gov.ae/images/
http://zone-h.com/mirror/id/23177998

Other than the TRA, same Iranian hacker also hacked the official website of WSIS National Committee of UAE. The mirror of hack is available below:

http://wsis.ae/uploads
http://zone-h.com/mirror/id/23177963

About Telecommunications Regulatory Authority (TRA):

The Telecommunications Regulatory Authority (TRA) is a government owned body, responsible for regulating the Information Communications and Telecommunications (ICT) sector in the United Arab Emirates (UAE).

READ MORE: International Cyber Gang arrested for hacking Dubai Exchange companies accounts

At the time of publishing this article, the targeted TRA sub-domain was unreachable.


The post Iranian Hacker Defaces Website of UAE’s Telecom Regulatory Authority appeared first on Hack Read.

Israeli Gift Store Breached, Customers Credit Card Details Leaked Online

$
0
0

A Saudi hacker going with the handle of @security_511 / on Twitter has claimed to hack a private online Israeli gift store and leak credit card details of customers on the web. 

After scanning the data, we have found out full usernames of credit/debit card owners with their phone numbers, addresses, date of birth, card type, card numbers, expiration date and most importantly CCV numbers of cc/db cards are also available.

Saudi hacker announced the breach on his Twitter account and claimed that this is only ‘The first batch’, and there is more to come.

Who.is shows that the gift store domain is registered under the name of Shlomo Molaim from Israel.

The leaked data seems to be legit, after researching we didn’t find the data on the Internet ever leaked before.

You can view the leaked data by clicking here

Note: We at HackRead recommend never to use leaked data for any purpose. The only reason we are putting the link of the leaked data is to present our readers with proof of what we write. 


The post Israeli Gift Store Breached, Customers Credit Card Details Leaked Online appeared first on Hack Read.

Indian ruling Party BJP’ Rajkot City Website Hacked by Z Company Hacking Crew

$
0
0

The famous online hacktivist Z Company Hacking Crew is back in action after a long time, this time by hacking and defacing the Indian ruling party Bharatiya Janta Party (BJP)’s Rajkot City website in support of an independent Kashmir.

Crew left a deface page along with a message on hacked BJP website, in support of a pan Islamist jihad starting from Kashmir and bringing Muslims back to power in the sub-continent. 

Some part of the deface message is available below:

”Hacked By ZCompany Hacking Crew! Invasion Will be reversed, First in Kashmir then to India.Akhand Bharat will be buried under the corpses of Hindu forces.The invasion will be reversed From Kashmir to India”

READ MORE: Pakistani hacker hacks Indian ruling party BJP’s politician L.K Advani website

A full preview of the deface page left by ZHC is available below: 

bjpwebsite-hacked-by-z-company-hacking-crew
Link of targeted BJP website along with its mirror as a proof of hack is available below: 

http://www.bjprajkotcity.org
http://zone-h.com/mirror/id/23187456?zh=1

ZHC has a history of high profile hacks, such as hacking of Indian Embassy in BahrainZionist Organisation UK & IrelandIndian Prime Minister Narendra Modi and English Defence League Website.

At the time of publishing this article, the BJP Rajkot website was hacked and displaying deface page left by the hackers.


The post Indian ruling Party BJP’ Rajkot City Website Hacked by Z Company Hacking Crew appeared first on Hack Read.

Russian Hackers Allegedly Hacked White House Computers

$
0
0

Unclassified White House computers are latest in the list of security breaches this year and the prime suspects for the breach are Russian hackers, who on government’s direction are working to carry out attacks on world’s most sensitive systems belonging to NATO, the Ukrainian government and U.S. defense contractors, according to reports.

Although, the attack didn’t led to be fatal damages but there were still minor disruptions in many services.

READ MORE: Russian hackers used Windows bug to hack NATO and Ukraine

russian-hackers-allegedly-hack-white-house-computers

Though, White House officials reported no damages to the systems as they found no evidence of any security breach. While giving statement regarding a probable breach official said:

“In the course of assessing recent threats, we identified activity of concern on the unclassified Executive Office of the President network,” said one White House official. “We took immediate measures to evaluate and mitigate the activity. . . . Unfortunately, some of that resulted in the disruption of regular services to users. But people were on it and are dealing with it,” according to Washington Post.

All the leading US agencies (FBI, Secret Service and National Security Agency) are employed to investigate this breach but all the information from the investigation is kept confidential. White House officials when asked regarding the breach and the suspects they were hesitant to answer and said:

“Certainly a variety of actors find our networks to be attractive targets and seek access to sensitive information,” the White House official said. “We are still assessing the activity of concern.”

According to the sources, these attacks were identified about 2 to 3 weeks back and as soon as they recognized all the staff members were asked to change their passwords, Intranet, email and VPN services were temporarily stopped. Though such an attack was always on cards as US has always kept Russians on the top-tier in terms of cyber capabilities.

READ MORE: Ukraine Government Offices bugged with Spyware by Russia

“On a regular basis, there are bad actors out there who are attempting to achieve intrusions into our system,” said a second White House official. “This is a constant battle for the government and our sensitive government computer systems, so it’s always a concern for us that individuals are trying to compromise systems and get access to our networks.”

Lastly, according to some of the security reports Russian have been carrying out cyber-­espionage campaigns to breach security of different systems. This has worked for the government and it is believed that same is applied in White House breach too.

READ MORE: Hackers Hijack Twitter accounts of The Associated Press Claiming Obama’s Injury in White House Blast

Though, it’s not the first time Russian hackers have breached security of such a highly sensitive system from US, in 2008 they breached security of a military classified system. But, that helped them to develop a system that could secure their sensitive computer systems and they came up with “US cyber command” which monitors country’s all the sensitive systems.


The post Russian Hackers Allegedly Hacked White House Computers appeared first on Hack Read.

How Gmail ID Can Be Hacked Despite Having Google’s Two-Factor Authentication On

$
0
0

The Two-factor authentication is believed to prevent Gmail accounts from getting hacked.

But what happened with indie developer Grant Blakeman shows how two-factor authentication can be beaten to takeover a Gmail account. 

Writing on the newly emerging social media site Ello, Blackman revealed how hackers hacked his Instagram account through his Gmail account. Despite the fact he was using two-factor authentication, the hackers were able to reset his Gmail password without any meaningful obstacles or security issue. 

READ MORE: Researchers show how to hack Gmail with 92% success rate

gmail-id-hacked-google-two-factor-authentication

So what actually happened?

Blackman woke up to a text on Saturday morning which was only about twenty minutes old. “Google Account password changed” it read. He tried to login in to his Gmail account but all in vain. Regardless of what he tried, Blackman couldn’t get in to his own Gmail account. He then tweeted about the hack where he was lucky enough to receive a response from Wired’s staff writer Mat Honan, who told Blackman to check with his cell phone provider and make sure that call-forwarding had not been enabled on his number without his knowledge. 

''I called, and sure enough, as of Saturday morning my number had been forwarded to a number I did not recognize. Unreal. So, as far I can tell, the attack actually started with my cell phone provider, which somehow allowed some level of access or social engineering into my Google account, which then allowed the hackers to receive a password reset email from Instagram, giving them control of the account,'' according to Blackman.

The post went viral and appeared on Hacker News. One of the commenter going with the handle of jasonisalive said that: 

''I work for a service providing company and service reps receive commission based on their client satisfaction, and because of it there's a constant tension between providing a good customer experience and protecting security and privacy. This means going by the book, keeping privacy standards high and just think about client satisfaction and provide them with what they need.'' 

Grant Blakeman was lucky to get a reply from Wired’s staff writer Mat Honan who helped him to restore all his accounts, but there many users getting hacked everyday without further knowledge of what to do next or how to restore their accounts.

READ MORE: Login with Google’ New USB Device and Keep Your Gmail Secure

This incident shows that two-factor authentication is not the solution for keeping your account secure. Just like we always say ‘‘Security in a Myth”.


The post How Gmail ID Can Be Hacked Despite Having Google’s Two-Factor Authentication On appeared first on Hack Read.

Philippines Dept of Trade and Industry Hacked, Login Details Leaked by Anonymous

$
0
0

An online hacktivist going with the handle of Anonymous Leyte has claimed to hack in to the official website of Philippines‘s Department of Trade & Industry (DTI) (http://bps.dti.gov.ph), ending up with leaking login details of 1900+ members online yesterday.

In an exclusive chat with hacker, we were told that reason for hacking the DIT’s website is to register a protest against the mishandling of the Yolanda Typhoon’s relief operations conducted by the National Government of the Philippines in Nov, 2013.

Anonymous-Philippines-hacks-department-of-trade-and-industry-login-details-leaked

The leaked data contains full names, usernames, emails and their password hashes. Some emails are registered on @dti.gov.ph domain, proving that data really belongs to DTI.

After analyzing the data, we have found it to be legit and never been leaked before over the web. You can click here to view the dumped data.

The hack was also covered by Rappler Philippines in their news bulletin which is available below:

Typhoon Haiyan, known in the Philippines Typhoon Yolanda, was one of the strongest tropical cyclones ever recorded, which devastated portions of Southeast Asia, particularly the Philippines, on November 8, 2013, according to Wikipedia.

Stay with us for more interesting hacking news.


The post Philippines Dept of Trade and Industry Hacked, Login Details Leaked by Anonymous appeared first on Hack Read.


Indiana State Department of Education Website Hacked

$
0
0

A group of hackers going with the handle of Nigeria Cyber Army hacked and defaced the official website of State of Indiana Department of Education, Monday morning. 

The home page of the DOE website was left with a deface page along with a note, but the reason for targeting the site was not mentioned anywhere. This somehow directs that it was a random act of hacking.

The note left by Nigerian hackers was expressed in follow worlds:

Hacked by cY63r M4R$#4L | Nigeria Cyber Army xD

When we contacted the DOE, one of their spokesman said they are aware of hack and it happened due to a vulnerability present in site’s content management system based on Drupal.

Fox News has also published a statement from DOE, according to which: 

This morning, the Indiana Department of Education’s website was hacked due to an apparent Drupal vulnerability. However, there is no sign that any data hosted on the website was compromised. The Department’s Information Technology staff has taken the website down temporarily while this issue is addressed. It is currently anticipated that the website will be down at least through the rest of the day.

A Facebook post from DOE on their official page about the hack is available here.

Link of targeted website along with its mirror as a proof of hack is available below: 

http://www.doe.in.gov
http://www.zone-h.org/mirror/id/23216751?zh=1

The site was offline all Monday. However, at the time of publishing this article; the website was restored and working online.


The post Indiana State Department of Education Website Hacked appeared first on Hack Read.

Say Hello To China’s New Laser Weapon Developed To Shoot Drones

$
0
0

China has developed a new laser weapon system that can accurately shoot lighter drones. The system has a range of 1.2 miles and can shoot down a drone within 5 seconds of finding its targets, facts released in a statement by an official of China Academy of Engineering Physics (CAEP).

According to the sources, such a laser system will help in providing security at all the major events in urban areas and will be handy in mapping unlicensed activities. The system can detect drones at maximum altitude of 500 meters and speed of 112 miles per hour.

120730-N-PO203-088

Such a system is devised because small unnamed drones are cheaper and easy to use for the terrorist so they pose lethal threads to the urban areas security. An official from High-tech corp. said:

“Intercepting such drones is usually the work of snipers and helicopters, but their success rate is not as high and mistakes with accuracy can result in unwanted damage,” he said.

During the initial tests the system worked perfectly and had 100 percent success in term of accuracy and speed. A sample of 30 drones was tested and all of them were successfully shoot down by the system.

READ MORE: Indian army mistakes Jupiter and Venus as Chinese spy drones

The China Academy of Engineering Physics is now working on more powerful laser systems and will soon be launching far more efficient systems to make the security all over China lot better. As Chinese authorities have an aim to ensure high-level of security at all the high profile event around the country.


The post Say Hello To China’s New Laser Weapon Developed To Shoot Drones appeared first on Hack Read.

Miami health center breach: Personal Data of 8,000 patients stolen

$
0
0

A Miami-based Jessie Trice Community Health Center has told its nearly 8,000 patients that their personal information from the center’s network has been stolen in a massive breach.

The stolen data contains full names, social security number and date of birth of 7,800 patients.

Annie Neasman, President & CEO of Jessie Trice Community Health Center said the incident is under investigation by the FBI and IRS.

READ MORE: Russian hackers charged in ‘biggest’ data breach case, 160mn credit card numbers stolen

The leadership of Jessie Trice Community Health Center, Inc. deeply regrets this incident and is working vigorously and diligently assessing how to mitigate future risks to all patients and has implemented new procedures and protocols to protect patient information so that this type of theft cannot reoccur, according to the statement.

The authorities found out about the breach late July and notified to the Miami health center on November 3, 2014.

A data breach like this is not something shocking these days, cyber criminals are taking advantage of vulnerable systems operated by unskilled staff. It’s time to educate the staff about advantages of cyber security. 

In case you have been affected by this data breach, feel free to call JTCHC corporate office at  (305) 636-3335. 

Source: JTCHC


The post Miami health center breach: Personal Data of 8,000 patients stolen appeared first on Hack Read.

Canadian church website hacked with hate messages by pro-ISIS hackers

$
0
0

A group of pro-ISIS hackers hacked and defaced the website of a Inniswood Baptist Church (http://inniswood.com/) in Barrie city of Canada, Monday afternoon.

Hackers left a deface page along with a message in Arabic and English text on the hacked church website, showing their affiliation and affection for the ISIS terrorist group in Iraq and Syria.

 

The English text said “I love you ISIS” along with ISIS logo. A long Arabic message calling for the destruction of America was also posted on the site, along with images of fighter jets and bloody victims of attacks.

Below are the two deface images uploaded by pro-ISIS Arab hackers:

Deface page that says I love you ISIS

Deface page that says I love you ISIS

canadian-church-website-hacked-pro-isis-messages-hackers-2

The deface page in English and Arabic about attacking Americans.

This is not the first time when the pro-ISIS hackers have targeted Canadian based website. Just two weeks ago, University of New Brunswick student union site was also under attack by the same group. 

We asked the church about their site hack and they were not aware of it at that time, but now the investigations are underway. 

At the time of publishing this article, Inniswood Baptist Church website was restored and working online.


The post Canadian church website hacked with hate messages by pro-ISIS hackers appeared first on Hack Read.

Bangladesh National Web Portal Hacked by AnonGhost Hacktivists

$
0
0

The online hacktivist group AnonGhost hacked and partially defaced the National Web Portal of Government of Bangladesh earlier today. 

It seems the hackers exploited the vulnerability currently existing in Drupal content management system.

Hackers left their group’s banner along with a message on the hacked web portal against the corrupt governments around the world. 

One part of the deface message vows governments to expect more attacks from the group.

We are anonymous. We are Legion.United as ONE. Divided by zero. We do not forgive Injustice.We do not forget Oppression. Governments of the World..."We are AnonGhost, We are legion, We do not forgive, We do not forget, Expect us."

Link of targeted Bangladesh National Web Portal along with its mirror as a proof of hack is available below: 

http://www.bangladesh.gov.bd
http://zone-h.com/mirror/id/23228601

This is not the first time when AnonGhost has targeted a high profile government website. In past the group hacked Israeli Ministry of Agriculture and Rural DevelopmentHillside Illinois Police Department and thousands of other websites.

At the time of publishing this article, the Bangladesh National Web Portal was down for maintenance.


The post Bangladesh National Web Portal Hacked by AnonGhost Hacktivists appeared first on Hack Read.

Hacktivist ‘Anonymous Leyte’ Targets Philippines Gov’t Sites for ‘Incompetence’.

$
0
0

Last week we updated you how Anonymous Leyte breached in to the official website of Philippines‘s Department of Trade & Industry (DTI), ending up with leaking login details of 1900+ members. Now the same hacker has hacked and defaced several Philippines government website for very same reason.

The Anonymous hacktivist left a deface page along with a message, criticizing the government role in mishandling the Yolanda Typhoon’s relief operations conducted by the National Government of the Philippines in Nov, 2013.

Leyte conducted the attack under the banner of Operation | Infosurge.

According to the deface message left by Anonymous:

It's been a year since Super Typhoon Yolanda (Haiyan) struck our land, but we have never forgotten the suffering you have clone to us during our time of recovery. We might have moved on from the painful wrath of the disaster however, we will not forget the misery you've brought to us with your incompetence in responding to our needs. Expect Us!

The targeted government sites belong to Davao Regional Hospital, Southern Philippine Development Authority,  National Industry Cluster Capacity Enhancement Project (NICCEP), Technical Education and Skills Development Authority and several other government owned websites. 

A full preview of deface page is available below:

anonymous-hacks-philippine-govt-websites-mishandling-yolanda-typhoon-relief-operation

Links of targeted sites along with their mirrors as a proof of hack is available here.

At the time of publishing this article, all targeted sites were still hacked with deface pages.


The post Hacktivist ‘Anonymous Leyte’ Targets Philippines Gov’t Sites for ‘Incompetence’. appeared first on Hack Read.

Pakistani Hacker Hacks Consulate General of India in Guangzhou, China

$
0
0

The never ending cyber war between India and Pakistan has taken new heights where hackers from both sides are targeting high profile government owned websites, but Pakistani hacker yesterday hacked the official website of Consulate General of India in Guangzhou, China

Hacker goes with a handle of ”Romantic”, uploaded a banner along with a note on the hacked Indian Consulate General website. Though the site was not completely defaced, but considering the importance of site and current circumstances; the hack couldn’t be ignored. 

A preview of banner uploaded by hacker is available below: 

pakistani-hacker-hacks-consulate-general-india-guangzhou-china-2

 

Link of targeted website along with its mirror as a proof of hack is available below: 

http://www.cgiguangzhou.gov.in 
http://zone-h.com/mirror/id/23236049?zh=1 

Indian hackers on the other side have also hacked Pakistani government websites which will be discussed in our next article based specifically on Indo-Pak cyber warfare.

At the time of publishing this article, the website of Consulate General of India was taken down and unreachable for users.


The post Pakistani Hacker Hacks Consulate General of India in Guangzhou, China appeared first on Hack Read.


Hackers Target Turkish Badminton Federation Website For Free Kurdistan.

$
0
0

A group of Kurdish hackers going with the handle of MedHack hacked the official website of Turkish Badminton Federation or Türkiye Badminton Federasyonu in Turkish language (http://www.badminton.gov.tr/) in support of a free Kurdistan.

The group left a deface page along with a message on the hacked Badminton Federation website, vowing to keep fighting for their fatherland what the call is Kurdistan.

The message has been translated from Kurdish language to English. (Special thanks to our friend Jelena Jovanovic for translation) 

''We will never stop until we free the fatherland. salute to all Kurdish fighters for a Kurdistan. Salute to the resistance of the captives," according to the deface message.

(Note. This message is not related to Kurd in Syria but to recent uprising in Turkey).

READ MORE225 Turkish Websites Hacked by Kurdish Hackers

A full preview of the deface page is available below:

hackers-target-turkish-badminton-federation-website-for-free-kurdistan

Link of targeted website along with its mirror as a proof of hack can be found below:

http://www.badminton.gov.tr
http://zone-h.com/mirror/id/23246500

The Kurdish MedHack group has a history of targeting Turkish government and privately owned websites in support of a free Kurdistan.

About Turkish Badminton Federation website: The website works under the Turkish government, dealing with the Badminton related activities locally and internationally.

READ MORE: Kurdish News Network KNN Website Hacked by Turk Hack Team

The Badminton Federation website was restored moments ago.


The post Hackers Target Turkish Badminton Federation Website For Free Kurdistan. appeared first on Hack Read.

U.S. Postal Service Breached, 800k employees Affected (China Suspected)

$
0
0

The computer networks of United States Postal Service were breached, affecting 800,000 employees of the company; according to a statement by the USPS. The discovery was made in September 2014 — the actual date of breach is not clear. 

Though the breach is surrounded by uncertainty, but the Washington Post is certain that Chinese government is behind the attack. At the same time FBI is conducting investigations, not sure who is behind this breach. 

usps-breached-data-steal-china-security-1

The stolen data contains names, social security numbers, date of birth, addresses, dates of employment and other information of 800,000 employees. USPS claims that their customers credit card info from http://usps.com/ wasn’t affected, but names, phone numbers and email addresses of some customers were stolen.

At this time, we do not believe that potentially affected customers need to take any action as a result of this incident, says a statement from USPS.

James A. Lewis, a cyber-policy expert at the Center for Strategic and International Studies believes that USPS is a prime target for Chinese because it’s a state-owned entity that has vast amounts of data on its citizens.

“They’re just looking for big pots of data on government employees. “For the Chinese, this is probably a way of building their inventory on U.S. persons for counterintelligence and recruitment purposes,” according to the Washington Post

This is not the first time when China has been blamed for attacking computer networks in the United States. Just last week a report published in Associated Press claimed China hacked U.S. Dept. of Homeland Security Contractor.

China, however has always denied its involvement in any cyber crime, calling it something that is against their cyber crime laws; but at the same time it admitted having a cyber warfare unit in People’s Liberation Army.

The post U.S. Postal Service Breached, 800k employees Affected (China Suspected) appeared first on Hack Read.

AnonGhost Hacks United Nation Website Amid Al-Aqsa Mosque Tensions.

$
0
0

The famous online pro-Palestinian hacktivist ”AnonGhost” has hacked and defaced the official website of United Nations (UN) earlier today against the Israeli invasion of Al-Aqsa Mosque in East Jerusalem. The attack was conducted under the banner of #OpSaveAlAqsa.

AnonGhost left a deface page along with a message on hacked UN site in support of Palestine and Al-Aqsa Mosque. The group vowed to keep on targeting Israeli cyber space.

The deface message was expressed in following words:

We are the sound of the forgotten people, the freedom fighter in the cyberworld and our main target is Sionisme and israhell, if you are asking why your website got hacked by us, its basically because we want to share our message and show the world who we are, we are not looking for fame but we have a goal to achieve we supporte all hackers teams and we supporte all the freedom mouvement in the world. #OpSaveAlAqsa decided , Expect us!

A full preview of deface page uploaded by AnonGhost is available below:

The deface page by AnonGhost

The deface page by AnonGhost

This is not the first time when AnonGhost has targeted a high-profile website in support of Palestine. In past, Israeli Ministry of Agriculture and Rural Development and Israeli Defense Contractor ISPRA were also hacked for the same cause.

The targeted link of United Nation website along with its mirror as a proof of hack is available below: 

http://sites.un.org/contact
http://www.zone-h.com/mirror/id/23247500

About AnonGhost: 

AnonGhost is a group of hackers from around the world, who hack against Israel and in support of Palestine and other countries of the Muslim world. 

About Operation Save Al-Aqsa:

Save Al-Aqsa is an online op started by AnonGhost after Israeli invasion in Al-Aqsa mosque few days ago. AnonGhost vowed to target Israeli websites along with servers of its allies. 

At the time of publishing this article, the deface page was removed and targeted link was unreachable. 

Stay tuned, we will be publishing more news on Operation Save Al-Aqsa.


The post AnonGhost Hacks United Nation Website Amid Al-Aqsa Mosque Tensions. appeared first on Hack Read.

Hackers target high-profile company bosses from luxury hotels — Kaspersky.

$
0
0

Senior executives from America, China, Japan, and Russia were the prime targets of these hacktivists, who stole logins for Google, Facebook and Yahoo Services using a keylogger.

High ranking business executives visiting luxury Asian hotels and utilizing their public Wi-Fi have returned with their devices infected with malwares, says a top security research firm.

The Russian Internet security provider Kaspersky Lab has identified a security threat called ‘Darkhotel APT’ that ties “to a specific hotel or business center Wi-Fi and physical connections.”

Image credit: Kai Hendry/flickr

Image credit: Kai Hendry/flickr

The malware only attacked specific targets and not all visitors accessing the public Wi-Fi, indicating a possibility of a state-sponsored hacking.

“So far all victims we have been able to trace are very important people and they make sense in the context. Maybe what we have here is the same framework being used by two different groups - one with a focus on other nation states, the other focusing on business interests… it wouldn’t be abnormal,” Costin Raiu from Kaspersky Lab was quoted by The Guardian.

The hackers seem to have advanced knowledge of their victims’ schedule and routine and included CEOs, senior vice presidents, sales and marketing directors, top research and development staff, said the security firm.

The hackers primary targets were usernames and passwords for Google, Facebook, Yahoo, and Twitter accounts of American and Asian executives.

Detected as “Tapaoux”, “Pioneer”, “Karba”, and “Nemim”, and many similar names, the malware disguised as a pop-up asks a victim to download updates to popular software such as Google Software, Adobe Flash, and Windows messenger.

Once the victim grants the permission, the device is infected, providing easy access to hackers to steal the data held in the device.

Some of the main features of this active threat include, global access, advanced ‘mathematical and crypto-analytical offensive capabilities,’ well-developed low-level keyloggers, zero-day vulnerabilities (which means the threats never seen before nor fixed by any vendor).

The hackers used seemingly legitimate certificates to make the malware look authentic; in one case the certificate was stolen from a Certificate Authority (CA).

The attacks date back to 2009 and the malware was apparently spread not just through hotel Wi-Fi, but also through peer-to-peer networks like BitTorrent.

Zero-days and CA indicate high skill levels of the hackers and have surprised onlookers.

This type of targeted attack is uncommon. The steps taken to infect the machines and factors that have to be in place for it to work make it a very specialist type of infection,” said Mark James, Security Specialist at Anti-Virus firm ESET.

The firm advises to use Virtual Private Networking (VPN) to avoid being victim of such an attack.


The post Hackers target high-profile company bosses from luxury hotels — Kaspersky. appeared first on Hack Read.

U.S. Dept. of Transportation Website Hacked By Chinese Hacker

$
0
0

A Chinese hacker going with the handle of ”M4ix#4s” from ”1937 CN Team” has hacked and defaced the official website of Federal Transit Administration (FTA) of U.S. Department of Transportation.

Hacker left a deface note along with a message in Mandarin Chinese language. The reason for targeting U.S. Department of Transportation website wasn’t mentioned anywhere. (But then Chinese hackers targeting a United States government owned website explains the reason itself).

The deface message was expressed in following words: (The below given text was translated from Mandarin Chinese language to English by using Google Translator.)

''Hey, this is our first public action, because we live in darkness for too long. We do not have anything for the world somewhere, or a race of people to promote justice lofty thoughts, nor to make any contribution to the national and patriotic feelings. Today, you see, is just a very simple penetration. Thus, Hacked by M4ix # 4s.''

A preview of the note uploaded by hacker is available below:

u-s-department-of-transportation-website-hacked-by-chinese-hacker

The deface note

The link of targeted website along with its mirror as a proof of hack is available below:

http://www.fta.dot.gov
http://www.zone-h.org/mirror/id/23255087

It is unclear if hacker works for the Chinese government or not, but such hacks will create rift between both countries. The United States repeatedly blamed Chinese government for conducting cyber attacks on high-profile state owned servers/websites, including the United States Postal Service (USPS)Dept. of Homeland Security and U.S. weather systems and its satellite. 

At the time of publishing this article, the targeted U.S. Department of Transportation, Federal Transit Administration website was restored and available online.


The post U.S. Dept. of Transportation Website Hacked By Chinese Hacker appeared first on Hack Read.

Viewing all 2194 articles
Browse latest View live