Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ Information Security Newspaper|Infosec Articles|Hacking News Mon, 17 Jan 2022 18:22:25 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://www.securitynewspaper.com/snews-up/2018/12/news5.png Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ 32 32 Dark web sales platforms Monopoly Market and Cartel Market shut down mysteriously https://www.securitynewspaper.com/2022/01/17/dark-web-sales-platforms-monopoly-market-and-cartel-market-shut-down-mysteriously/ Mon, 17 Jan 2022 18:22:23 +0000 https://www.securitynewspaper.com/?p=24717 For various reasons, during the most recent months multiple illegal platforms on the dark web dedicated to the sale of stolen confidential information, drug trafficking, arms sales and other illicitRead More →

The post Dark web sales platforms Monopoly Market and Cartel Market shut down mysteriously appeared first on Information Security Newspaper | Hacking News.

]]>
For various reasons, during the most recent months multiple illegal platforms on the dark web dedicated to the sale of stolen confidential information, drug trafficking, arms sales and other illicit practices have definitively stopped their operations, leaving behind dozens or hundreds of sellers and customers in total uncertainty, in addition to generating enormous doubts among law enforcement agencies.

Two of the most recent cases involve Monopoly Market and Cartel Market, which have disrupted their activities without apparent explanation, at least for the time being. While there is likely to be no relationship at all, both closures occurred at virtually the same time, drawing the attention of researchers and users.

Monopoly Market

Through Dread (a forum on the dark web similar to Reddit), users mentioned that Monopoly Market was no longer available since December 28. The administrators of an account operated by black market administrators tried to address all possible doubts: “We are experiencing a period of inactivity for holidays; our hands are tied right now unless, of course, something bad has happened, although this doesn’t seem to be the case.”

The administrators of Monopoly Market assure that this is not a case of the popular “exit scam”, in which the operators of a platform on the dark web disappear without a trace, taking with them the funds of sellers and customers.

At the moment this seems to be all the information available about the incident, since there is no data about it on other platforms and any hypothesis about it is considered speculation. However, shortly after the monopoly Market administrators appeared on Dread, the moderator of the forum known as ShakyBeats blocked the Monopoly subdread: “Scam? Arrested? Overdosed? We may never know what happened to /u/MonopolyOfficial,” the moderator said, turning on alerts among users and sellers on this platform.

Despite attempts to stop speculation, Dread users continued to list all the possible reasons why this platform disappeared, highlighting three hypotheses: 

  • An exit scam
  • A problem between administrators
  • Authorities caught administrators

Although some users rule out an exit scam because Monopoly Market operates without electronic wallets, specialists say that this does not prevent operators from carrying out an exit scam without a trace, so this possibility should not be ruled out.

Cartel Market

On the other hand, the administrators of Cartel Market disappeared practically at the same time as Monopoly Market. On December 29, an update was published on the platform in which an administrator identified as Ryuu mentioned having been the target of a powerful cyberattack: “Last Friday we were hit by a denial of service (DOS) attack; if you are experiencing connection issues, try logging in by getting a new Tor identity,” the statement said.

However, a thread in Dread notes that another administrator has had trouble even communicating with the rest of the team: “I don’t have access to the backend and I don’t know what happened to the rest of the team. I think something really serious may have happened… We’ll wait a couple more days to see if anything changes.”

Amid the uncertainty, Cartel Market users had had limited access to the platform, experiencing a 502 Error, which does not provide clear information about what happened. Eventually, a new error message appeared, notifying users that it was not possible to find the onion service descriptor associated with Cartel Market.

In this regard, moderator ShakyBeats believes that cartel market operators could have been victims of a scam deployed by another cybercriminal group, although nothing is confirmed: “I prefer to be cautious until I have more certainty about the matter,” concludes SjakyBeats.

This is certainly a peculiar situation, although it is by no means unlikely, especially considering that platforms such as White House Market, Cannazon and ToRReZ announced their closure recently. Still, authorities will continue to investigate the real reasons behind the sudden disappearance of these platforms.

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.

The post Dark web sales platforms Monopoly Market and Cartel Market shut down mysteriously appeared first on Information Security Newspaper | Hacking News.

]]>
How to DDos deepweb .onion sites in just 4 commands? https://www.securitynewspaper.com/2021/07/08/how-to-ddos-deepweb-onion-sites-in-just-4-commands/ Thu, 08 Jul 2021 18:54:00 +0000 https://www.securitynewspaper.com/?p=23491 A denial of service (DoS) attack is to force a failure of the target system by creating a condition in which users cannot access the attacked servers. A successful attackRead More →

The post How to DDos deepweb .onion sites in just 4 commands? appeared first on Information Security Newspaper | Hacking News.

]]>

A denial of service (DoS) attack is to force a failure of the target system by creating a condition in which users cannot access the attacked servers. A successful attack can force all sorts of subsequent scenarios, including filtering a database, extracting source code or simply keeping the website attacked offline.

Federal Bureau of Investigation (FBI) agents even employ DoS tactics to bring down onion websites, as they are much more susceptible to these attacks than conventional websites.

This time, ethical hacking specialists from the International Institute of Cyber Security (IICS) will show you how you can launch a powerful DoS attack on onion websites using a simple tool and a few commands.

For this:

  • Install the Torshammer tool
  • In the file itself, replace the three values “9050” with “9150” and save these settings
  • Open a terminal and type the following command:

cd torshammer

  • We’ll start adding:

./torshammer.py -t example.onion -r 300 –T

Remember that this article was prepared for strictly academic purposes, so IICS is not responsible for any misuse that may be given to this tool. To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.

The post How to DDos deepweb .onion sites in just 4 commands? appeared first on Information Security Newspaper | Hacking News.

]]>
Top 6 illegal darknet markets to find hackers, stolen data, vulnerabilities, exploits, malwares & ransomware https://www.securitynewspaper.com/2021/05/23/top-6-illegal-darknet-markets-to-find-hackers-stolen-data-vulnerabilities-exploits-malwares-ransomware/ Sun, 23 May 2021 16:00:00 +0000 https://www.securitynewspaper.com/?p=23561 The dark web is mainly known for the idea that in this sector of the Internet you can find all kinds of drugs, although this is not the only thingRead More →

The post Top 6 illegal darknet markets to find hackers, stolen data, vulnerabilities, exploits, malwares & ransomware appeared first on Information Security Newspaper | Hacking News.

]]>

The dark web is mainly known for the idea that in this sector of the Internet you can find all kinds of drugs, although this is not the only thing sold in the most dangerous areas of the network. This time, cybersecurity experts from the International Institute of Cyber Security (IICS) will show you the most important dark web hacking forums.

Remember that this article was prepared for informational purposes only; IICS is not responsible for the misuse of the information below.

WWH-CLUB

This is the world’s largest Russian-speaking hacking forum and features a clearnet address accessible even from a Russian IP address. According to cybersecurity specialists, one of the main features of this website is the provision of training services; for about a thousand dollars, WWH-CLUB hackers provide personalized advice to any user on the platform.

Previously WWH-CLUB users could find all kinds of files related to cybersecurity, although the growth of the platform has also allowed the proliferation of Internet trolls and users for unknown purposes.

To address this issue, forum administrators decided not to accept new users, so access to private sections of the forum can now only be realized with a payment of about $20 USD.

Onion address: https://wwhclublci77vnbi.onion/

Verified

This is a platform very similar to WWH-CLUB, cybersecurity experts say, as it functions as a reliable source for the search for computer security incidents and all kinds of paid services.

Registration on the forum costs around $50 USD and new users are always rigorously researched, experts warn. In other words, even by paying access to the forum older users have the last decision about newcomers.

Onion address: http://verified2ebdpvms.onion/

Exploit.in

In this forum users can discuss all kinds of hacking topics and, unlike the examples above, registration in Exploit.in is free. However, new users must have the approval of older members and provide links to their accounts on other hacking platforms, which must not be less than one year old.

This is one of Russia’s most respected hacking platforms and is even popular with some Users of the West. The main services that can be found in this forum are the sale of botnets and the creation of malicious websites. Exploit.in is also accessible via clearnet and has a Jabber server.

Address: https://forum.exploit.in/

CrdClub

This is one of the oldest hacking forums, as mentioned by cybersecurity experts. Registration for CrdClub is free and can be divided into two main areas: for Russian-speaking users and English-speaking users.

There are hundreds of articles dedicated not only to all kinds of hacking topics, but also to methods of electronic scamming, phishing and social engineering.

Onion address: http://crdclub4wraumez4.onion/

Probiv

In many cases participants in hacking forums prefer not to actively engage in illegal transactions such as bank fraud or information theft; this does not appear to be the case with Probiv. A distinctive feature of the forum is that, in exchange for a certain amount of money, threat actors can find all kinds of information about a target user, including personal, professional information, medical records, and even financial and credit information.

In this forum are also popular the so-called “profit schemes”, in which hackers sell manuals for the deployment of all kinds of scams in exchange for a portion of the profits obtained by the operators of these malicious campaigns. The price range of these manuals varies depending on the type of material.

Onion address: https://probiv7jg46vmbox.onion/

DaMaGeLaB.IN

Probably the most important English-speaking hacking forum, with users involved in all kinds of discussions about hacking, cybersecurity trends, malware development and other topics of interest to the cybercriminal community.

According to cybersecurity specialists, this is one of the few hacking forums that have not been seized by the U.S. or European authorities, so they will try to do their best to maintain their reputation.

Onion address: http://damagelabo2jiykj.onion/

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.

The post Top 6 illegal darknet markets to find hackers, stolen data, vulnerabilities, exploits, malwares & ransomware appeared first on Information Security Newspaper | Hacking News.

]]>
How Russian Are Hacking Skyscanner, Expedia, booking.com & trivago to get Cheap Deals https://www.securitynewspaper.com/2020/10/08/5-underground-travel-agencies-in-deep-web/ Thu, 08 Oct 2020 16:31:00 +0000 https://www.securitynewspaper.com/?p=22054 Airlines and hotel chains are attractive targets for cybercriminals, as they can earn great rewards by attacking these platforms, not forgetting that some of these platforms have their own vulnerabilityRead More →

The post How Russian Are Hacking Skyscanner, Expedia, booking.com & trivago to get Cheap Deals appeared first on Information Security Newspaper | Hacking News.

]]>
Airlines and hotel chains are attractive targets for cybercriminals, as they can earn great rewards by attacking these platforms, not forgetting that some of these platforms have their own vulnerability rewards program, digital forensics experts mention. 

These companies operate with a wealth of personal and financial information from millions of people, as well as travel histories, reward program memberships, and more. Many companies have been attacked by these criminals, including British Airways, Easyjet, Travelex, Marriott and more; With this information in their possession, threat actors act as a kind of travel agents on deep web forums, selling airline tickets, hotel reservations, car rentals and even organizing weddings in high-demand tourist destinations, all at an extremely low cost. 

In a certain way, these black market travel agencies are helping many travelers, including cybercriminals, save up to 70% of what they would have paid at a conventional travel agency. 

In these illegal forums it is possible to find many underground travel agencies where great deals are offered for travel; however, there are always some that stand out for having thousands of customers around the world and having made millions selling airline tickets and hotel reservations illegally. These travel agencies are a paradise of offers for any traveler and among them stand out the following.

PATRIARH OR “THE PATRIARCH”

Новости Сервиса
https://t.me/patriarhservice

This is a very popular service within Russian criminal forums. In it you can make all kinds of reservations and within their ads they claim that they can get prices even 50% lower than those offered by companies like Booking.com, as mentioned by digital forensics experts.

Tickets on these clandestine forums are full of feedback from satisfied customers, who praise their services within the tourism industry. In these same forums the same customers post photos of their vacation along with regularly handwritten thank you notes and taken in front of a first class airplane seat or in a five-star hotel. These photos somehow function as proof that the service offered does work. 

Their prices vary and obviously depend on what you want to buy; However, as in all black, clandestine and illegal markets, anonymity is crucial, so your preferred payment method is in Bitcoin and other cryptocurrencies.

SERGIK00

Sergik00 is another clandestine forum that functions as a deep web travel agency. Unlike the previous position on the list, this platform also offers car rental, excursions and even VIP weddings at ridiculously low prices. As if that weren’t enough, your team also obtains and sells all kinds of illegal or fake documents you may need to travel to another country, including passports and document alterations.

Публикация Фото отзывов о работе сервиса от @sergik00 (Авиа, Отели, Депозиты, Прокат Авто, Экскурсии и многое другое)
https://t.me/sergik00_promo

Like Patriarh, this forum is full of testimonials from satisfied customers, who post photos from luxurious hotel rooms, airplanes, swimming pools, beaches and more tourist destinations. One curious thing about this platform is that the team behind Serggik00 even presumes to have served famous influencers. Its main base of operations is Telegram, although its deep web sites always show great activity.

BANTIK TRAVEL

Приветствуем на канале ,где почти все брони по 25% от стоимости ! Если хотите приобрести , пишите @batniksales
https://t.me/batniksales1

Bantik Travel is a black market travel agency that works differently from Patriarh and Sergik00. What they do is ask interested buyers to provide details of the trip they are looking to book with examples of Expedia or any other site that sells airline tickets and hotel reservations indirectly. Once customers provide that information, the operators of this platform are responsible for creating a custom list so that the customer decides what they prefer to buy.

Similar to Patriarh and Sergik00, these vendors use Telegram and conventional offline platforms.

MOON WELL TRAVEL & MOONBEAM TRAVEL

In their ads, these platforms ensure that they are part of a team of professionals dedicated to providing their customers with convenient and comfortable stays. Among its services are the sale of coupons for prepaid services and promise that if it is not possible to specifically book the hotel that interests the user, they can get an equivalent replacement or even a better quality hotel at no extra cost. At the moment, your payment method is restricted to the Monero cryptocurrency.

Now that we know of the existence of these clandestine travel agencies, it is also important to understand where they get the hotel reservations and air tickets they offer for sale. According to digital forensics experts, there are currently several methods, some of which we will review below.

AIRLINE ACCOUNTS

In these forums that function as underground markets we can also find for sale cards from stolen airlines. These tend to be sold in auction and wholesale processes; this is no surprise, as conventional credit cards have years to be sold on many underground forums and black markets.

GIFT CARDS

Another way cybercriminals and travel agents exploit the airline industry is by purchasing certificates and gift cards with massive discounts that reach up to 50% of the original value. Additionally, in order to generate higher profits, these gift cards are usually purchased with airline points from stolen accounts.

Redeeming points from stolen accounts to buy gift cards is an easy way for cybercriminals to earn money fast. Gift cards can also be purchased directly with stolen frequent flyer points or may even have been stolen directly, including their security codes and everything you need to use them instantly.

INDIRECT BOOKING SITES

In these illegal markets, in addition to directly attacking airlines and hotel chains, cybercriminals exploit booking search engine companies. Some users even share exploit methods for sites like Expedia or Kayak, where they take advantage of vulnerabilities on their sites.

Although this is a profitable business for criminals, some of them like to say that they attack such third-party booking companies for a moral issue, saying that because they take advantage of customers by not offering any kind of refund, they do the same.  It’s definitely an easy way to sell something obtained at no cost.

Protect your airline accounts and loyalty programs with hotels

Just imagine that one of these hackers steals your miles or your hard-earned traveler points. To keep this from happening to you, follow the tips presented below by the International Institute of Cyber Security (IICS):

  • Always use strong passwords: Also remember to use two-factor authentication when available
  • Stay alert to phishing cyberattacks: Even if your airline’s mail looks like, if you’re asked for personal information about your account, you’d better contact them directly by the means you already know
  • Don’t expose your frequent flyer number: On your boarding passes, as well as hotel bills, the printed loyalty account number is usually included, so always be sure to shredder these documents at the end of the trip. Additionally, never share photos of your boarding passes on social media
  • Stay on top of your rewards or points accounts: It’s easy to forget about loyalty accounts or points we generate until we finally want to use them.  To prevent theft, it is always important to check them from time to time, as well as to be aware of recent news about data leaks within different companies

Implementing these measures can significantly reduce the risk of compromised your traveler information.

The post How Russian Are Hacking Skyscanner, Expedia, booking.com & trivago to get Cheap Deals appeared first on Information Security Newspaper | Hacking News.

]]>
A dark web cannibal, child rapist and necrophile sentenced to 40 years in prison and supervision for life https://www.securitynewspaper.com/2020/09/30/a-dark-web-cannibal-child-rapist-and-necrophile-sentenced-to-40-years-in-prison-and-supervision-for-life/ Wed, 30 Sep 2020 23:18:37 +0000 https://www.securitynewspaper.com/?p=21781 Sometimes the events that occur on the dark web become terrifying stories that show us the darker side of people. According to a Department of Justice (DOJ) report, Michael Truncale,Read More →

The post A dark web cannibal, child rapist and necrophile sentenced to 40 years in prison and supervision for life appeared first on Information Security Newspaper | Hacking News.

]]>
Sometimes the events that occur on the dark web become terrifying stories that show us the darker side of people. According to a Department of Justice (DOJ) report, Michael Truncale, federal district judge in Texas, announced a 40-month prison sentence against an individual charged with child exploitation charges related to a publication on an onion site whose name was not disclosed.

La imagen tiene un atributo ALT vacío; su nombre de archivo es darkwebcannibal.jpg

A couple of years ago, local authorities arrested Alexander Nathan Barter, 23, appointed as responsible for a post on a dark web forum expressing his desire to murder and eat a person: “I would like to try necrophilia and cannibalism and know what it’s like to take a life. If you’d be willing to let yourself be killed and live in the southern United States, contact me,” mentions the disturbing publication found by undercover agents browsing underground forums.

A special agent, posing as the father of a 13-year-old girl, contacted the defendant by offering his alleged daughter to satisfy his wishes. Barter fell into the trap and began exchanging messages with the agent for a few days in October 2018, during which time Barter repeatedly expressed his desire to commit the horrific crimes mentioned above.  

After some conversations, Barter and the officer agreed to meet to commit the crime at a location provided by the defendant, who recommended the agent buy a disposable phone and some clothes to wear after the murder.

The agreed day was October 19, 2018 in Joaquin, Texas. Just a few minutes after arriving, Barter was arrested by the authorities; the agents in charge of the arrest mention that the individual carried with him a knife, garbage bags, a cell phone and a tablet.

Months unfulesting, Barter pleaded guilty to attempted coerce and incitement to a minor, in addition to distributing child pornography, receiving a 240-month sentence for each charge, or 40 years in prison. After serving his time in prison, Barter must undergo lifetime supervision.

Stephen Cox, a U.S. attorney, says: “Talking about anything online isn’t just talking; this chilling case is the sample. Constant surveillance of the agents responsible for monitoring these websites has allowed a disturbed individual to be arrested before he carries out his plans.”

The post A dark web cannibal, child rapist and necrophile sentenced to 40 years in prison and supervision for life appeared first on Information Security Newspaper | Hacking News.

]]>
Data leaking! Hackers are selling 62,000 accounts from eToro, the online trading platform https://www.securitynewspaper.com/2020/07/10/data-leaking-hackers-are-selling-62000-accounts-from-etoro-the-online-trading-platform/ Fri, 10 Jul 2020 19:20:23 +0000 https://www.securitynewspaper.com/?p=20543 Specialists in secure data erasure report that eToro users are exposed to great risk because an unidentified hacker group managed to access around 62,000 accounts, which are now for saleRead More →

The post Data leaking! Hackers are selling 62,000 accounts from eToro, the online trading platform appeared first on Information Security Newspaper | Hacking News.

]]>
Specialists in secure data erasure report that eToro users are exposed to great risk because an unidentified hacker group managed to access around 62,000 accounts, which are now for sale on a hacking forum.

It should be remembered that eToro is a broker platform specialized in social trading, allowing users to employ complex financial mechanisms without great knowledge in the subject. This platform trades multiple financial instruments such as stocks, currencies, selling options and cryptocurrencies. With three different locations in Cyprus, Israel and the United Kingdom, eToro is one of the main options in its field. 

In its latest reports, eToro claimed to have more than 3 million active accounts, indicating its great growth in recent years, mentioned experts in secure data erasure.

For a few hours, multiple reports of users have begun to appear that detected unusual activity in their accounts, which would eventually have led to the massive hacking of eToro.

Esta imagen tiene un atributo ALT vacío; su nombre de archivo es etorohack01.jpg

In its advertisement, hosted on the deep web, hackers claim that the database for sale has records of users such as name, email address, passwords, addresses, city of residence, among other details related to the type of operations that are carried out on eToro.

Esta imagen tiene un atributo ALT vacío; su nombre de archivo es etorohack02.jpg

In addition, threat actors added some details about the activity of compromised accounts, specifying that those interested in these accounts could buy and sell shares in large companies (such as Amazon, Yandex, Tesla, among others), as well as having access to the resources of affected eToro users. It is still unknown whether hackers have already sold this information to any interested buyers.

The incident is already being investigated by those responsible for the platform, although experts in secure data erasure recommend potentially affected users to reset their passwords as an additional security measure while resolving this issue.

Those responsible for the attack operate on the deep web, which has become the ideal refuge for cybercrime groups. For years, authorities in dozens of countries have invested considerable efforts in combating clandestine hacking forums housed in this area of the Internet, although it is virtually impossible to stop their advance. 

For further reports on vulnerabilities, exploits, malware variants and computer security risks, it is recommended to enter the website of the International Institute of Cyber Security (IICS), as well as the official platforms of technology companies.

The post Data leaking! Hackers are selling 62,000 accounts from eToro, the online trading platform appeared first on Information Security Newspaper | Hacking News.

]]>
Employee data leaked: Apple, Google, Microsoft,LinkedIn, Intel Cisco, Verizon, Oracle, HP, Nvidia affected https://www.securitynewspaper.com/2020/04/24/employee-data-leaked-apple-google-microsoftlinkedin-intel-cisco-verizon-oracle-hp-nvidia-affected/ Fri, 24 Apr 2020 05:16:35 +0000 https://www.securitynewspaper.com/?p=19522 Cyber forensics research team has found a sale of database containing 2GB of records detailing information on employees of big corporate companies like Apple, Google, Microsoft, LinkedIn, Intel Cisco, Verizon,Read More →

The post Employee data leaked: Apple, Google, Microsoft,LinkedIn, Intel Cisco, Verizon, Oracle, HP, Nvidia affected appeared first on Information Security Newspaper | Hacking News.

]]>
Cyber forensics research team has found a sale of database containing 2GB of records detailing information on employees of big corporate companies like Apple, Google, Microsoft, LinkedIn, Intel Cisco, Verizon, oracle and HP.

International institute of cyber security research team of Jim Gill and RSU found the database for sale on a deep web forum. The database contains extremely detailed information about individual homes ranging from the name, office address, home address, phone number, age, birthdates and official and personal email.

Data broker/hacker named Bastardlord has posted an advertisement for his database. The hacker mentions that the database is available over bidding.

Cyber forensics experts mentioned “Unlike previous leaks we’ve discovered, this time, we have no idea how the hacker got this database.

However, there are a few clues. Each records contains a employee ID indicating it could be from a some human resource database company, also there is a category for income level leading, cyber forensics experts to think it could be from a HR solutions company that provide HR ERP to big corporate companies like Apple, Google, Microsoft, LinkedIn, Intel Cisco, Verizon, oracle and HP.

Having no luck on there own research they have decided to crowd source the problem by asking others to put on their detective hats and ponder the clues available.

“What HR software is used by companies like Apple, Google, Microsoft, LinkedIn, Intel Cisco, Verizon, Oracle, HP, Nvidia, United stated department of transportation. What provider would be common among all these companies.?” He asked.

Even though the records do not include truly damaging information such as Social Security numbers or payment card information, the data available could still prove dangerous if in the wrong hands.

  • There are enough data contained in the database to do vishing and phishing attacks.
  • A name and address are enough to find out if a person lives in a wealthy area, and can lead to public social media accounts. With home address this info could be used to conduct burglaries.
  • All the information together can be used to build a social engineering snapshot making a person vulnerable to a variety of exploits.

The database was discovered while the cyber forensics experts were conducting a deep web-mapping project.

The post Employee data leaked: Apple, Google, Microsoft,LinkedIn, Intel Cisco, Verizon, Oracle, HP, Nvidia affected appeared first on Information Security Newspaper | Hacking News.

]]>
4 million credit cards used in restaurants for sale in hacking forums https://www.securitynewspaper.com/2019/11/29/4-million-credit-cards-used-in-restaurants-for-sale-in-hacking-forums/ Fri, 29 Nov 2019 19:58:03 +0000 https://www.securitynewspaper.com/?p=17817 A hacker group has released a new database of stolen payment cards on Joker’s Stash, a popular hacking forum. According to web application security specialists who analyzed the new publication,Read More →

The post 4 million credit cards used in restaurants for sale in hacking forums appeared first on Information Security Newspaper | Hacking News.

]]>
A hacker group has released a new database of stolen payment cards on Joker’s Stash, a popular hacking forum. According to web application security specialists who analyzed the new publication, this time the stolen information appears to be related to the hacking on four major restaurant chains in the US.

This new batch appeared on the hacking forum over the past week, displaying information from the food chains Krystal, Moe’s Southwest Grill, McAlister’s Deli and Schlotzsky’s, mention the specialists from, security firm Gemini Advisory.

In the last three chains, the security incident would have occurred last August, impacting multiple branches across the US. In total, 1,500 branches could have been affected by the data breach. Krystal’s case is a little different, as data theft would have occurred between July and September this year. More than 350 branches of this chain would have been potentially affected.

Gemini’s web application security experts mention that of the more than 1700 restaurants belonging to these chains, about 50% would have became victim of the data breach. In other words, it is estimated that at least 4 million customers and their respective payment cards were compromised. The largest concentration of affected branches is found in the states of North Carolina, South Carolina, Florida and Georgia, specialists mention.

Months passed for hackers to reveal the stolen information at Joker’s Stash; According to experts, this is a strategic measure to not overwhelm the platform with too many offers, reducing the profit margin for threat actors. Another possible reason the hackers would have waited until November to run the ad on Joker’s Stash is due to the start of the holiday shopping season, which will kick off with the popular Black Friday.

According to web application security experts, Joker’s Stash remains one of the most active illegal platforms, specializing in the sale of stolen bank details. A few weeks ago an ad was posted on the platform on a database with more than 1.2 million payment card records stolen from multiple banks, mainly in India.

One of the sectors that has suffered the most from these incidents recently is the hospitality industry, as the threat actors have found that, most of the time, the staff working in these companies do not have the required knowledge to detect and address a computer security threat.

Recently, web application security specialists from the International Institute of Cyber Security (IICS) reported the detection of a massive phishing campaign targeting hotel chains and online travel agencies. Using email with attachments, hackers deliver malware to target computers, download and execute malware, and eventually access these companies’ networks to extract payment card data from customers.

The post 4 million credit cards used in restaurants for sale in hacking forums appeared first on Information Security Newspaper | Hacking News.

]]>
How to easily launch your startup in dark web in 3 minutes https://www.securitynewspaper.com/2019/10/20/how-to-easily-launch-your-startup-in-dark-web-in-3-minutes/ Sun, 20 Oct 2019 16:38:47 +0000 https://www.securitynewspaper.com/?p=17381 When you want to launch your business in deep web there are lot of things to worry about like hosting, privacy, anonymity and getting a onion url. First step toRead More →

The post How to easily launch your startup in dark web in 3 minutes appeared first on Information Security Newspaper | Hacking News.

]]>
When you want to launch your business in deep web there are lot of things to worry about like hosting, privacy, anonymity and getting a onion url. First step to launching a startup is creating a website. So in this article we teach you how to easily achieve that first step in 3 minutes.

https://youtu.be/-CIfUohEvL8

OnionShare is a tool that emerged in 2014 and, according to experts in ethical hacking, in principle only fulfilled the function of sending files anonymously and securely. This tool compresses the files, starts a local server on the user’s machine that includes a link to the compressed file, converts the website into a Tor onion service, and displays the web server URL. The user sends this .onion URL, loading it into the Tor browser to finally download the compressed file. When the file is downloaded, OnionShare closes this service.

Since its launch, OnionShare has grown and evolved. Now you can not only share files privately, but it always works the same way, hosting an anonymous website locally. Recently, a team of experts has tried to host real websites using OnionShare, making some interesting findings.

According to ethical hacking experts, OnionShare has implemented the new “Publish Website” feature. Simply put, OnionShare will launch a server to host a static website and provide an .onion URL. The site created in this way will only be accessible through the Tor network; in addition, visitors will not have access to data such as location, identity or IP address, so the website will not be subject to censorship.

When you share something that is not public, OnionShare uses basic HTTP authentication. In this way, the URLs shared in this way appear in a format similar to: http://onionshare: [password]@[address].onion. When the URL is loaded in the Tor browser, the user will be asked if they want to sign in first, as shown below:

When you click OK, the URL in the address bar does not contain the OnionShare part: [password], which makes it look like a conventional website.

In addition, in the website settings menu, it is possible to enable “Public Mode” so that any user has access to the website without the URL displaying the username and password.

On the other hand, if the user wants to use the OnionShare service to publish a website that will remain online for a long time, they should remember that the computer is acting as a web server, so if the computer is turned off or goes inactive, the website will be closed, mention the specialists in ethical hacking.

To prevent this from happening, it is preferable to use a computer dedicated specifically to this work. Another way to keep this service active is to go to the OnionShare settings and choose the “Use Persistent Address” option. In case the computer shuts down or suspends, the next time you use the service the URL will remain the same. Otherwise, each URL generated by OnionShare will be temporary and non-reusable.

One of the new features of OnionShare is the ability to collect all requests that visitors make on one of these websites. For example, below is a website hosted on OnionShare scanned with the Nikto web vulnerability analysis tool.

Finally, the International Institute of Cyber Security (IICS) ethical hacking specialists mentioned that you can browse through the lists of folders shared by OnionShare so that anyone can see exactly what files will be downloaded before the process begins.

In addition, by visiting OnionShare settings and disabling the “Stop Sharing after File Send” feature, people will also be able to download shared files individually instead of downloading them all on one occasion.

The post How to easily launch your startup in dark web in 3 minutes appeared first on Information Security Newspaper | Hacking News.

]]>
POPULAR NEWS VIDEO 26 JULY https://www.securitynewspaper.com/2019/07/26/popular-news-video-26-july/ Fri, 26 Jul 2019 14:48:32 +0000 https://www.securitynewspaper.com/?p=16248 Hackers attack the Official Twitter account of the UK London Metropolitan Police | They are hacking the food apps, be careful now it was turn of Deliveroo App Below areRead More →

The post POPULAR NEWS VIDEO 26 JULY appeared first on Information Security Newspaper | Hacking News.

]]>

Hackers attack the Official Twitter account of the UK London Metropolitan Police | They are hacking the food apps, be careful now it was turn of Deliveroo App

Below are the links of the cyber security news.

1. They hacked the Official Twitter account of the UK London Metropolitan Police

2. They are hacking the food apps, be careful now it was Deliveroo

The post POPULAR NEWS VIDEO 26 JULY appeared first on Information Security Newspaper | Hacking News.

]]>
Top cyber security news|21 May 19 https://www.securitynewspaper.com/2019/05/23/top-cyber-security-news21-may-19/ Thu, 23 May 2019 17:07:02 +0000 https://www.securitynewspaper.com/?p=15270 Here we talk about cyber attacks to Antivirus Companies, WhatsApp and Samsung, backdoor vs Microsoft Exchange and the identity of Satoshi Nakamoto is still hidden. Below are the links ofRead More →

The post Top cyber security news|21 May 19 appeared first on Information Security Newspaper | Hacking News.

]]>


Here we talk about cyber attacks to Antivirus Companies, WhatsApp and Samsung, backdoor vs Microsoft Exchange and the identity of Satoshi Nakamoto is still hidden.

Below are the links of the cyber security news.

1. Hackers attack three antivirus companies and they offer for sale their source codes https://www.securitynewspaper.com/2019/05/09/three-antivirus-companies-were-hacked-and-their-source-cold-was-sold/

2. Spyware hacks dozens of Smartphone via WhatsApp

3. LightNeuron, a backdoor designed against Microsoft Exchange

4. Filtered confidential source code owned by Samsung

5. The countdown to meet Satoshi Nakamoto was a fake new

Please leave your questions and comments.

Subscribe to see more official content of the cyber security news channel: https://www.youtube.com/channel/UCkSS40hQHvq7_QvevJuME_g

Official website: https://www.securitynewspaper.com/

Follow us on our social networks.

Twitter: https://twitter.com/Webimprints

Facebook: https://www.facebook.com/webimprint/

The post Top cyber security news|21 May 19 appeared first on Information Security Newspaper | Hacking News.

]]>
Distributed Denial o Secrets: a new competitor for WikiLeaks https://www.securitynewspaper.com/2019/01/26/distributed-denial-o-secrets-a-new-competitor-for-wikileaks/ Sat, 26 Jan 2019 00:00:19 +0000 https://www.securitynewspaper.com/?p=14052 The cyberactivism has a new anonymous face According to Salvador Ruiz, network security specialist from the International Institute of Cyber Security, Distributed Denial of Secrets (DDOS) is a transparency collectiveRead More →

The post Distributed Denial o Secrets: a new competitor for WikiLeaks appeared first on Information Security Newspaper | Hacking News.

]]>

The cyberactivism has a new anonymous face

According to Salvador Ruiz, network security specialist from the International Institute of Cyber Security, Distributed Denial of Secrets (DDOS) is a transparency collective whose main goal is to enable the free transmission of public interest data. DDOS aims to avoid any political, corporate or personal leanings, and simply act as a beacon of available information. As a collective, DDOS do not support any cause, idea or message beyond ensuring that information will be available to those who need it most – the people.

How to get: https://ddosecretspzwfy7.onion.to/

The grouo recently announced the release of a massive email leaking belonging to Russian oligarchs, journalists, religious leaders and politicians.

While DDOS team is happy to serve as an index to data of all varieties, mostly follow this two criteria:

  • Is the data of public interest?
  • Can a prima facie case be made for the veracity of the contents?

Unless already public, or as authorized by its source, DDOS do not disclose the providing party of any received information, and it’s fully committed to ensuring their anonymity from all threats. DDOS could never advise on the perfect procedure for transferring data to its platform anyone else, but it can act as a shield for that process and share advice from its experience. Often its role is to not just make data available, but to act as an anonymity guard to pass data to journalists and other figures best positioned to interrogate it.

The Collective

DDOS is a small group, but its reach expands far beyond just the members, not all of who are listed or ever acknowledged by their own preference. DDOS have informally worked together for many years and have developed deep connections in the field of data gathering, research, journalism, activism and technology. In 2018, DDOS members decided to put together their expertise and time to create a unified project representing their shared goals, and provide a platform for others to know and trust.

The modern state of “leaking” organizations has deteriorated rapidly for many years, poisoned by their own egos and interests. The DDOS view is that data is a resource and a record – this data can never tell the whole story. DDOS trusts the public to be responsible with data, and open it to them for the rigorous examination of it. In time, the truth can always emerge.

The Team

Emma Best – @NatSecGeek

Emma is an independent journalist who has spent more years filling out FOIA’s than most people have spent reading the news. Known for her tenacity in always finding the next lead and penetrating the bureaucratic walls of government, she has a keen eye for the details in every document and is a ruthless advocate for the truth even when all others dare not dig deeper.

“The Architect”

This is the pseudonym for DDOS’s technical behemoth that prefers to remain anonymous. He is no stranger to controversy and has been involved in privacy and technology activism for at least 10 years. The Architect is primarily responsible for advising on the operational security of the collective and maintains web and technical operations for the group.

WANTED

DDOS is always looking to expand its available data sets. They can consider almost any data, but they are actively seeking out the below information. If you can help them locate it, it would be greatly appreciated!

ACAPOR Leaked Emails (Torrent Hash: 4b92fe94ccb803d6c5b97abc4c7ebdf706290539)

Filipe Menezes Emails (Torrent Hash: 2866dc3538d12d99c88eb254591773d3821d939c)

Goldcorp (Torrent Hash: 0c385c2010e8a47e046ac8284f2f848c3ce5f8de)

Alleged emails from Ukraine’s Central Election Committee (Torrent Hash: 2df1c468641911537e3fbd22647c4bd14afebed7)

Anonymous Bulgaria/Greece/Spain releases

Armenia/Azerbaijan leaks and counterleaks

Five Star Movement (Moviemento 5 Stelle, M5S) emails

GhostSec advisory list of extremist sites and flagging content on Internet Archive

Lizard Squad database

LulzSec Canada/Peru releases

mSpy hack-Parastoo leaks

RedHat leaks

Team GhostShell releases

Telecomix releases

Seventh Day Adventist Church leak

Syrian Electronic Army leaks

Ukraine General Prosecutor’s Office leak

Winter-Leak.com leaked HBO files

Yemen Cyber Army Leaks

The post Distributed Denial o Secrets: a new competitor for WikiLeaks appeared first on Information Security Newspaper | Hacking News.

]]>