The Cleaver group is once again in the headlines managing a well-developed network of fake LinkedIn profiles for cyber espionage purpose. Do you remember the Iran-based APT Cleaver? In December the security firm Cylance released a detailed report on the hacking Operation Cleaver that was run by state-sponsored hackers linked to the Iran. The Iranian hackers targeted critical infrastructure worldwide, ten of which […]
Snowden told the BBC’s Panorama that the GCHQ has developed a hacking suite dubbed Smurf Suite, it can hack any mobile by sending an encrypted text message. There is no way to stop secret services spying on users’ Smartphones, this is the last revelation of the US whistleblower Edward Snowden. Snowden told the BBC’s Panorama that the […]
A study conducted by the Intelligence firm RecordedFuture demonstrates the efficiency of the analysis of hacker forums through traffic analysis-like techniques. Hacker forums still exist, hacking communities are with good shape and growing. Hacker Forums are normally hard to find and once you find them you will see them change again. Most prolific Hacker forums […]
According to the a statement by OPM Press Secretary Sam Schumach on Background Investigations Incident OPM breach included 5.6 Million Fingerprints. The press secretary of the Office of Personnel Management, Sam Schumach, announced that the data breach suffered by the OPM exposed approximately 5.6 million sets of fingerprints belonging to federal employees, contractors, and other members of the staff. In […]
According to an investigation by the GCHQ intelligence agency ISIS hackers targeted information held by some of David Cameron’s most senior ministers. According the experts at the British Intelligence GCHQ, ISIS hackers intercept top secret British Government emails. The investigation conducted by the GCHQ allowed the British intelligence to uncover a serious breach, terrorists linked […]
The US Justice Department issued guidelines for StingRay Surveillance devices, new rules define aim to ensure privacy protection and transparency. Do you know what is a StingRay? If you want further details give a look to a post I wrote for the Infosec Institute on the StingRay Technology: “StingRay is an IMSI-catcher (International Mobile Subscriber […]
Security researchers have uncovered a group of fake recruiting accounts on LinkedIn used for intelligence gathering about security experts. A group of fake recruiter accounts is abusing the LinkedIn professional social network to send invitations to security professionals in various industries. The fake recruiters attempt to deceive targets usually by using a LinkedIn profile with […]
Dark Web Intelligence could help law enforcement and intelligence agencies to gather information on potential attacks. Which are the risks? The increased number of cyber attacks against government entities and the hypothesis that the U.S. government should take an offensive strike against hackers who hit the countries raised the discussion on the problem of the attribution. Prevention, mitigation and […]
The jihadist hacker Junaid Hussain was killed this week in a US targeted air strike in Syria. The man was actively recruiting ISIS sympathizers. A spokesman for the US Central Command, Colonel Patrick Ryder, confirmed that the jihadist hacker Junaid Hussain was killed in a targeted air strike on August 24 in Raqqa, Syria. Colonel […]
The experts at EFF organization speculate that Russian State-sponsored hackers belonging the APT 28 group have managed the last EFF Spear phishing Scam. Attackers, alleged to belong to a Russian state-sponsored APT registered a bogus Electronic Frontier Foundation domain earlier this month. The hackers used the name brand of popular privacy watchdog in an attempt to trick […]